Modeling and Simulation of Computer Networks and Systems 2015
DOI: 10.1016/b978-0-12-800887-4.00017-1
|View full text |Cite
|
Sign up to set email alerts
|

Simulation methods, techniques and tools of computer systems and networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

4
1

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 51 publications
0
7
0
2
Order By: Relevance
“…We use MNIST data and a widely used software environment PyTorch to perform a digit classification task to evaluate the proposed framework. The simulations were conducted on a laptop with 2.2 GHz Intel i7 processor and 16 GB of memory [29,30]. Simulation parameters are illustrated in Table 1.…”
Section: Discussionmentioning
confidence: 99%
“…We use MNIST data and a widely used software environment PyTorch to perform a digit classification task to evaluate the proposed framework. The simulations were conducted on a laptop with 2.2 GHz Intel i7 processor and 16 GB of memory [29,30]. Simulation parameters are illustrated in Table 1.…”
Section: Discussionmentioning
confidence: 99%
“…To verify the effectiveness of the proposed 5G enabled IoT security solution to predict and mitigate FDIA and DDoS attacks, we performed extensive experiments. The experiments were meant to evaluate the detection rate and the number of attacks mitigated by the proposed security model [19,20]. We simulated the proposed solution on Intel machine Core™ i7-8550U.…”
Section: Discussionmentioning
confidence: 99%
“…There have been several researchers have tried to address the challenges of using blockchain in an IoT context [7,8]. For instance, [9] and [10] used a distributed time-based consensus algorithm to ensure end-to-end security and ensure trustworthy transactions.…”
Section: Introductionmentioning
confidence: 99%