Abstract: One of the major challenge in underwater acoustic wireless sensor networks (UWASNs) is designing the energy efficient medium access control (MAC) protocol. Because in UWASNs, all nodes are ...
Abstract: With the development of internet technology, intelligent and covert threat methods, such as zero-day attacks, Advanced Persistent Threats, and ransomware attacks, have emerged in an endless ...