Search
Search Results
-
T-SEA: trust based secure and energy aware routing protocol for mobile ad hoc networks
A trust based secure and energy aware (T-SEA) routing protocol for detection and isolation of black/gray hole nodes in mobile ad hoc networks...
-
Security Issues and Challenges in Deploying a CPS Using WSN
The domains of wireless sensor networks and Mobile Ad Hoc Networks (MANETs) have seen a lot of research activity during the last two decades (WSN).... -
APT-Dt-KC: advanced persistent threat detection based on kill-chain model
Advanced persistent threat attacks are considered as a serious risk to almost any infrastructure since attackers are constantly changing and evolving...
-
Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks
Wireless sensor networks (WSN) are mainly deployed in an unattended and hostile environment. So security is a major concern in these types of... -
Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system
Recently Mobile adhoc networks (MANETs) have received the great attention of researchers as these models provide a wide range of applications. But...
-
Safety and Security Issues in Employing Drones
The use of drones has been steadily growing over the past few years, not only in a variety of businesses and governmental organizations but also... -
An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme
Sensitive images are being transmitted over insecure media as network and information technology evolve at a rapid pace. As a result, people are...
-
IoT Security Vulnerabilities and Defensive Measures in Industry 4.0
The Internet of things (IoT) has been emerging technology for the past decade. IoT can be defined as the network connecting objects to the Internet... -
Post-layout Security Evaluation Methodology Against Probing Attacks
Probing attack is considered to be one of the most powerful attack used to break the security and extract confidential information from an embedded... -
One-Pixel Attack: Understanding and Improving Deep Neural Networks with Evolutionary Computation
Recently, the one-pixel attack showed that deep neural networks (DNNs) can misclassify by changing only one pixel. Beyond a vulnerability, by... -
Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure
AbstractThis paper presents an adaptive control system for detecting computer attacks in CII based on a neuro-fuzzy analysis of variant cyber-threat...
-
Application of an Artificial Neural Network for Detection of Attacks in VANETs
AbstractThis work contains results of develo** an approach for detecting routing attacks in VANET networks using an artificial neural network. In...
-
A secured routing algorithm against black hole attack for better intelligent transportation system in vehicular ad hoc network
The societal costs accompanying the developments are usually related to traffic congestion and accidents. The condition can be enhanced by providing...
-
Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic
AbstractThis paper examines the problem of identifying network anomalies when processing data streams in industrial systems. A network anomaly refers...
-
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
5G-based mobile ad hoc networks with cloud are a new paradigm that combines several real-world applications. Routing and security are current issues...
-
CTMFSO algorithm-based efficient color image segmentation by fuzzy order entropy
Identifying the object on the image or identifying disparate objects or regions independently is the major goal of Image Analysis (IA). Image...
-
IoV security and privacy survey: issues, countermeasures, and challenges
As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to...
-
Performance evaluation of hybrid WOA-XGBoost, GWO-XGBoost and BO-XGBoost models to predict blast-induced ground vibration
Accurate prediction of ground vibration caused by blasting has always been a significant issue in the mining industry. Ground vibration caused by...
-
Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques
In software engineering, the planning and budgeting stages of a software project are of great importance to all stakeholders, including project...
-
The Connected and Autonomous Vehicle Trade-Off: Functional Benefits versus Security Risks
Connected and autonomous vehicles (CAVs) are becoming increasingly commonplace. Vehicles are equipped with a range of communication mechanisms, and...