scispace - formally typeset
Search or ask a question
Topic

Cognitive network

About: Cognitive network is a research topic. Over the lifetime, 4213 publications have been published within this topic receiving 107093 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A cyclic approach is proposed, named as energy-cognitive cycle, which extends the classic cognitive cycle and enables dynamic selection of different available strategies for reducing the energy consumption in the network while satisfying the quality of service constraints.

21 citations

Journal ArticleDOI
TL;DR: This paper explains the OSI Reference Model, which comprises of seven different layers, each layer is having its own responsibilities.
Abstract: A reference model is a conceptual blueprint of how communication should take place. It addresses all the process required for effective communication and divides these processes into logical grouping called layers. When a communication system is designed in this manner, it is known as layered architecture. The OSI isn’t a physical model, though. Rather, it’s a set of guidelines that application developers used to create and implement application that run on a network. It also provides a framework for creating and implementing networking standards, devices, and internetworking schemes. This paper explains the OSI Reference Model, which comprises of seven different layers. Each layer is having its own responsibilities.

21 citations

Book ChapterDOI
01 Jan 2016
TL;DR: This chapter tackles the network intrusion detection problem from a classification angle by using a recently proposed granular model named Rough Cognitive Networks (RCN), a fuzzy cognitive map that leans upon rough set theory to define its topological constructs.
Abstract: Security in computer networks is an active research field since traditional approaches (e.g., access control, encryption, firewalls, etc.) are unable to completely protect networks from attacks and malwares. That is why Intrusion Detection Systems (IDS) have become an essential component of security infrastructure to detect these threats before they inflict widespread damage. Concisely, network intrusion detection is essentially a pattern recognition problem in which network traffic patterns are classified as either normal or abnormal. Several Computational Intelligence (CI) methods have been proposed to solve this challenging problem, including fuzzy sets, swarm intelligence, artificial neural networks and evolutionary computation. Despite the relative success of such methods, the complexity of the classification task associated with intrusion detection demands more effective models. On the other hand, there are scenarios where identifying abnormal patterns could be a challenge as the collected data is still permeated with uncertainty. In this chapter, we tackle the network intrusion detection problem from a classification angle by using a recently proposed granular model named Rough Cognitive Networks (RCN). An RCN is a fuzzy cognitive map that leans upon rough set theory to define its topological constructs. An optimization-based learning mechanism for RCNs is also introduced. The empirical evidence indicates that the RCN is a suitable approach for detecting abnormal traffic patterns in computer networks.

21 citations

Journal ArticleDOI
TL;DR: A resistive memory network that has no crossover wiring is proposed to overcome the hardware limitations to size and functional complexity that is associated with conventional analogue neural networks.
Abstract: A resistive memory network that has no crossover wiring is proposed to overcome the hardware limitations to size and functional complexity that is associated with conventional analogue neural networks. The proposed memory network is based on simple network cells that are arranged in a hierarchical modular architecture. Cognitive functionality of this network is demonstrated by an example of character recognition. The network is trained by an evolutionary process to completely recognise characters deformed by random noise, rotation, scaling and shifting.

21 citations

Journal ArticleDOI
TL;DR: In this paper, a game-in-game framework is proposed to characterize the decisions of agents and quantify their risk of bounded perception due to the limited attention in the IoT environment.
Abstract: With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a critical concern, and the users should invest to secure their IoT applications. Due to the massive devices in the IoT network, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user makes security decisions based on the cyber risks he perceives by observing a selected number of nodes. To this end, we propose a model which incorporates the limited attention or bounded rationality nature of players in the IoT. Specifically, each individual builds a sparse cognitive network of nodes to respond to. Based on this simplified cognitive network representation, each user then determines his security management policy by minimizing his own real-world security cost. The bounded rational decision-makings of players and their cognitive network formations are interdependent and thus should be addressed in a holistic manner. We establish a games-in-games framework and propose a Gestalt Nash equilibrium (GNE) solution concept to characterize the decisions of agents, and quantify their risk of bounded perception due to the limited attention. In addition, we design a proximal-based iterative algorithm to compute the GNE. With case studies of smart communities, the designed algorithm can successfully identify the critical users whose decisions need to be taken into account by the other users during the security management.

21 citations


Network Information
Related Topics (5)
Wireless network
122.5K papers, 2.1M citations
90% related
Network packet
159.7K papers, 2.2M citations
88% related
Wireless ad hoc network
49K papers, 1.1M citations
88% related
Wireless
133.4K papers, 1.9M citations
87% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202317
202234
202175
2020104
2019121
2018134