-
Chapter and Conference Paper
Feature Selection-Based Evaluation for Network Intrusion Detection System with Machine Learning Methods on CICIDS2017
Network attacks endanger the privacy and security of information. As a consequence of this, an effective mechanism is required for identifying network attacks. In this study, we show NIDS to increase classific...
-
Chapter and Conference Paper
Addressing DIO Suppression Attack in RPL based IoT Networks
The Internet of Things (IoT) has brought a revolution in technology in the last decade. IoT is susceptible to numerous internal routing attacks because of the characteristics of the sensors used in IoT network...
-
Chapter and Conference Paper
Performance Assessment of Routing Protocols in Cognitive Radio Vehicular Ad Hoc Networks
Cognitive radio technology is an inventive method to solve spectrum scarcity problems in wireless networks. Growing interest of cognitive radio (CR) technology in vehicular communication systems has led CR-ena...
-
Chapter and Conference Paper
Analysis of Hatchetman Attack in RPL Based IoT Networks
Low power and lossy networks (LLN) are flourishing as an integral part of communication infrastructure, particularly for growing Internet of Things (IoT) applications. RPL-based LLNs are vulnerable and unprote...
-
Chapter and Conference Paper
Performance Evaluation of Image-Based Diseased Leaf Identification Model Using CNN and GA
India is an agricultural country and plays an important role in agriculture due to rapid population growth and increased demand for food production. Due to growing population, weather shifts and to make more p...
-
Chapter and Conference Paper
Investigation of SNR in VLC-Based Intelligent Transportation System Under Environmental Disturbances
Various forms of wireless communications technologies have been proposed for intelligent transportation systems (ITSs). Recent events have illustrated that visible light communication (VLC) can play a signific...
-
Chapter and Conference Paper
Hybrid Genetic Algorithm: Traveling Salesman Problem
A genetic algorithm has three main operators namely selection, crossover and mutation. Each operator has various sub operators. Selection of sub operator that can be applied on particular problem is difficult...
-
Chapter and Conference Paper
Performance Assessment of Thirteen Crossover Operators Using GA
Performance of genetic algorithms depends on evolutionary operators, i.e., selection, crossover, and mutation, in general, and on the type of crossover operators, in particular. With constant research going on...
-
Chapter and Conference Paper
Real-Time VANET Applications Using Fog Computing
The main objective of vehicular ad hoc networks (VANETs) is to improve driver safety and traffic efficiency. Most of VANET applications are based on periodic exchange of safety messages between nearby vehicles...
-
Chapter and Conference Paper
Cuckoo Search Strategies for Solving Combinatorial Problems (Solving Substitution Cipher: An Investigation)
Approximate algorithms have been well studied in order to solve combinatorial problems. This paper addresses cryptanalysis of the substitution cipher which is an interesting combinatorial problem. For this pur...
-
Chapter and Conference Paper
Vimprint: Exploring Alternative Learning through Low-End Mobiles
The Internet today provides a plethora of applications to assist anyone wanting to learn a new subject, language or a concept. Resources available include dictionaries, translation engines, downloadable e-book...
-
Chapter and Conference Paper
Visual Conversational Interfaces to Empower Low-Literacy Users
Mobile phones have come a long way from being plain voice calling devices to becoming multipurpose handy tools powered by ever increasing new applications available on-the-go. For many, the mobile phone of tod...
-
Chapter and Conference Paper
Misbehavior Detection Based on Ensemble Learning in VANET
Detection of misbehaviors in Vehicular Ad Hoc Networks (VANETs) using machine learning methods has not been investigated extensively. In VANET, an illegitimate vehicle may transmit inaccurate messages to trigg...
-
Chapter and Conference Paper
Machine Learning Approach for Multiple Misbehavior Detection in VANET
The motivation behind Vehicular Ad Hoc Networks (VANETs) is to improve traffic safety and driving efficiency. VANET applications operate on the principle of periodic exchange of messages between nodes. However...
-
Chapter and Conference Paper
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
Vehicular Ad-hoc Networks (VANET) technology provides a fast, easy to deploy and an inexpensive solution for intelligent traffic control and traffic disaster preventive measure. In VANET, moving vehicles commu...