![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture
Wireless Sensor Network (WSN) is usually deployed in hostile and uncontrollable environment. The WSN is vulnerable to security threats due to its hostile nature. There are several static security techniques in...
-
Chapter and Conference Paper
Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack
Internet is based on best effort and end to end design principles. Although they are the reasons for the Internet’s high efficiency and popularity, they also resulted in many inherent security problems such as...
-
Article
Open AccessA histogram specification technique for dark image enhancement using a local transformation method
Traditional image enhancement techniques produce different types of noise such as unnatural effects, over-enhancement, and artifacts, and these drawbacks become more prominent in enhancing dark images. To over...
-
Article
RETRACTED ARTICLE: A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology
Technology is continually evolving, and Blockchain development in recent years has shown tremendous adaptability. Blockchain’s emphasis lies mainly in the finance sector, but some latent fields such as healthc...
-
Article
Retraction Note: A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology