- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
Jiangsu University
2020-2021
The incipient vehicular applications and the explosive growth of data generally led to increase in demand for communication, computation, storage resources, as well stringent performance requirement on latency wireless network capacity. To address these challenges, Vehicular Edge Computing is an envisioned promising solution that extends computation capability edge offloading service provided proximity vehicles. computing (VEC) D2D communication have been designed benefit from gain optimize...
Different kinds of attacks on the network have greatly increased due to exponential increase in number users over last decade. This has hampered transactions online especially when they are financially based. Hence, there is every need develop and design new cybersecurity techniques curb these cyber-crimes. study presents accurate classification Transmission Control Protocol (TCP) User Datagram (UDP) flows using Machine Learning (ML) based parameter optimization. The method was validated...