ICTs including Big Data and Artificial Intelligence
https://repository.rsif-paset.org/xmlui/handle/123456789/8
2024-03-29T05:59:33ZA Bibliometric Analysis of Research on Techniques for Network Communications Security
https://repository.rsif-paset.org/xmlui/handle/123456789/363
A Bibliometric Analysis of Research on Techniques for Network Communications Security
Sikiru, Ismaeel Abiodun; Dossou, Michel
Presently, security is very paramount in all endeavors that aim to guarantee seamless network communications, including our confidentiality, integrity, availability, and trust. Thus, the objective of this bibliometric analysis is to examine and map the scientific advances in network communications security (NCS) in the recent years, while also projecting for future direction on the subject. To achieve this objective, web of science database was searched for related literature. While adopting preferred reporting items for systematic reviews and meta-analyses (PRISMA) approach for inclusive and exclusive criteria, R package was executed for data analysis. Our findings, under the analysis of authors, countries, publications, and word analysis, show that Zhang Y (h-index=9; 13.4%) and Wang X (h-index=9; 12.4%) are the most contributing authors towards NCS. Anna University, India, is the most- contributing affiliated institution in this work, with 13.6%. Country- wise, USA is the most cited affiliated-countries, 6470 (32.1%). Of the sources, though Security and Communication networks journal has most studies on the subject, 91 (22.2%), IEEE Access owns highest h-index of 25 with citations of 1963 (35.7%). Also, keyword analysis reveals that in the recent years, “security”, “machine learning”, and “5G” are the most-relevant keywords used by authors. This study also reveals open interest, such as trust management, data models, and quantum mechanisms, for research community in network communications.
Full text: https://doi.org/10.1109/ICITISEE58992.2023.10404181
2024-01-31T00:00:00ZReliability Evaluation Framework for Centralized Agricultural Internet of Things (Agri-IoT)
https://repository.rsif-paset.org/xmlui/handle/123456789/362
Reliability Evaluation Framework for Centralized Agricultural Internet of Things (Agri-IoT)
Thiam, Fatoumata; Mbaye, Maissa; Flores, Maya; Wyglinski, Alexander
This paper presents a holistic reliability evalua-tion framework for Agri-IoT based on real-world testbed and mathematical modeling of network failure prediction. A testbed has been designed, implemented, and deployed in the real-world in the experimental farm at Saint-Louis/Senegal as a representative area of Sahel conditions. Data collected has been used for real-world reliability analysis and to feed mathematical modeling of network reliability based on energy and environ-mental conditions data with Kaplan Meier and Nelson Aalen estimators. Key factors affecting the network’s lifespan, such as network coverage and density, are explored, along with a comprehensive evaluation of energy consumption to understand node discharge rates impact. The survival analysis, employing Kaplan-Meier and Nelson-Aalen estimators, establishes network stability and the probability of node survival over time. The findings contribute to the understanding of Agri-IoT reliability in a real-world Sahel environment, offering practical insights for system optimization and environmental challenge mitigation in real-world deployments.
Journal article
2024-01-01T00:00:00ZRadio Coverage Prediction in Wireless Networks: A Bibliometric Study
https://repository.rsif-paset.org/xmlui/handle/123456789/361
Radio Coverage Prediction in Wireless Networks: A Bibliometric Study
Balogoun, Marianne Alfredine Omonlola; Houndji, Vinasétan Ratheil; Dossou, Michel; Honfoga, Anne-Carole
The problem of predicting radio coverage is a fundamental step in the wireless networks design process and is nowadays very helpful in reducing drive tests for monitoring. Among the continuous flow of research in this area, a scientific contributions map becomes relevant to guide future researches correctly. This paper provides a bibliometric analysis and future research avenues to predict radio coverage. A structural insight is obtained on conceptual clarification, collaborations, top sources, authors, affiliations, most cited documents, and most cited countries. A total of 3134 documents have been analyzed: 49% are journal papers and 51% are proceedings papers. 60% of them are published during the last seven years. The majority of recent relevant works on the topic are focused on wireless communication systems, specifically 5G. The USA, China, and India are leading the way in research in this field. IEEE access, IEEE transactions on antennas, and propagation are the leading journals.
Conference proceeding full text: https://doi.org/10.1007/978-981-99-3236-8_27
2023-09-15T00:00:00ZMid@ndro: a Middleware Architecture for Malware Detection on Android
https://repository.rsif-paset.org/xmlui/handle/123456789/360
Mid@ndro: a Middleware Architecture for Malware Detection on Android
Sawadogo, Zakaria; Thioye, Babacar; Gaye, Ibrahima; Dembele, Jean-Marie; Mendy, Gervais; Ouya, Samuel
Android is a highly popular platform for mobile devices; however, it is also vulnerable to malware attacks due to the platform's ability to allow users to install apps from unverified sources. This increases the risk of downloading and installing malicious apps on devices. To tackle this issue, security researchers and software developers have proposed several solutions, such as antivirus and anti-malware software, app scanning services, and more secure app distribution channels. Our proposal for addressing the challenge of detecting Android malware is through a middle-ware architecture that empowers users to make informed decisions about which apps to install and run on their device. This middle-ware would thoroughly analyze apps for potential security risks, provide users with a comprehensive understanding of the app's behavior, permissions, and potential risks, and based on this analysis, enable users to make informed decisions on whether or not to allow the app to continue running on their device.
Conference proceeding full text: https://doi.org/10.1109/CloudTech58737.2023.10366106
2023-12-29T00:00:00Z