We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 367 results
  1. T-SEA: trust based secure and energy aware routing protocol for mobile ad hoc networks

    A trust based secure and energy aware (T-SEA) routing protocol for detection and isolation of black/gray hole nodes in mobile ad hoc networks...

    Deepika Kukreja, Deepak Kumar Sharma in International Journal of Information Technology
    Article 18 November 2019
  2. Security Issues and Challenges in Deploying a CPS Using WSN

    The domains of wireless sensor networks and Mobile Ad Hoc Networks (MANETs) have seen a lot of research activity during the last two decades (WSN)....
    Mohan Kumar Dehury, Bhabendu Kumar Mohanta, Sangay Chedup in Information Technology Security
    Chapter 2024
  3. APT-Dt-KC: advanced persistent threat detection based on kill-chain model

    Advanced persistent threat attacks are considered as a serious risk to almost any infrastructure since attackers are constantly changing and evolving...

    Maryam Panahnejad, Meghdad Mirabi in The Journal of Supercomputing
    Article 12 January 2022
  4. Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks

    Wireless sensor networks (WSN) are mainly deployed in an unattended and hostile environment. So security is a major concern in these types of...
    Priya Chawla, Monika Sachdeva in Next-Generation Networks
    Conference paper 2018
  5. Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system

    Recently Mobile adhoc networks (MANETs) have received the great attention of researchers as these models provide a wide range of applications. But...

    Jasleen Kaur, Supreet Kaur in Cluster Computing
    Article 03 January 2021
  6. Safety and Security Issues in Employing Drones

    The use of drones has been steadily growing over the past few years, not only in a variety of businesses and governmental organizations but also...
    Durga Prasad Srirangam, K. Hemalatha, ... N. Ashok Kumar in Wireless Networks
    Chapter 2023
  7. An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme

    Sensitive images are being transmitted over insecure media as network and information technology evolve at a rapid pace. As a result, people are...

    Sujarani Rajendran, Manivannan Doraipandian, ... Kannan Kirthivasan in Multimedia Tools and Applications
    Article 10 October 2023
  8. IoT Security Vulnerabilities and Defensive Measures in Industry 4.0

    The Internet of things (IoT) has been emerging technology for the past decade. IoT can be defined as the network connecting objects to the Internet...
    Koppula Manasa, L. M. I. Leo Joseph in Artificial Intelligence and Cyber Security in Industry 4.0
    Chapter 2023
  9. Post-layout Security Evaluation Methodology Against Probing Attacks

    Probing attack is considered to be one of the most powerful attack used to break the security and extract confidential information from an embedded...
    Sofiane Takarabt, Sylvain Guilley, ... Yves Mathieu in Industrial Networks and Intelligent Systems
    Conference paper 2021
  10. One-Pixel Attack: Understanding and Improving Deep Neural Networks with Evolutionary Computation

    Recently, the one-pixel attack showed that deep neural networks (DNNs) can misclassify by changing only one pixel. Beyond a vulnerability, by...
    Danilo Vasconcellos Vargas in Deep Neural Evolution
    Chapter 2020
  11. Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure

    Abstract

    This paper presents an adaptive control system for detecting computer attacks in CII based on a neuro-fuzzy analysis of variant cyber-threat...

    V. M. Krundyshev, M. O. Kalinin in Automatic Control and Computer Sciences
    Article 01 December 2022
  12. Application of an Artificial Neural Network for Detection of Attacks in VANETs

    Abstract

    This work contains results of develo** an approach for detecting routing attacks in VANET networks using an artificial neural network. In...

    E. V. Malyshev, D. A. Moskvin, D. P. Zegzhda in Automatic Control and Computer Sciences
    Article 01 December 2019
  13. A secured routing algorithm against black hole attack for better intelligent transportation system in vehicular ad hoc network

    The societal costs accompanying the developments are usually related to traffic congestion and accidents. The condition can be enhanced by providing...

    Parul Tyagi, Deepak Dembla in International Journal of Information Technology
    Article 09 April 2018
  14. Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic

    Abstract

    This paper examines the problem of identifying network anomalies when processing data streams in industrial systems. A network anomaly refers...

    Article 01 December 2023
  15. Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud

    5G-based mobile ad hoc networks with cloud are a new paradigm that combines several real-world applications. Routing and security are current issues...

    Article 09 September 2021
  16. CTMFSO algorithm-based efficient color image segmentation by fuzzy order entropy

    Identifying the object on the image or identifying disparate objects or regions independently is the major goal of Image Analysis (IA). Image...

    Chandana Kumari, Abhijit Mustafi in Multimedia Tools and Applications
    Article 14 December 2022
  17. IoV security and privacy survey: issues, countermeasures, and challenges

    As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to...

    Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati in The Journal of Supercomputing
    Article 02 July 2024
  18. Performance evaluation of hybrid WOA-XGBoost, GWO-XGBoost and BO-XGBoost models to predict blast-induced ground vibration

    Accurate prediction of ground vibration caused by blasting has always been a significant issue in the mining industry. Ground vibration caused by...

    Yingui Qiu, Jian Zhou, ... Chuanqi Li in Engineering with Computers
    Article 22 April 2021
  19. Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques

    In software engineering, the planning and budgeting stages of a software project are of great importance to all stakeholders, including project...

    Sofian Kassaymeh, Mohammed Alweshah, ... Mohammad Atwah Al-Ma’aitah in Cluster Computing
    Article 12 February 2023
  20. The Connected and Autonomous Vehicle Trade-Off: Functional Benefits versus Security Risks

    Connected and autonomous vehicles (CAVs) are becoming increasingly commonplace. Vehicles are equipped with a range of communication mechanisms, and...
    Na Liu, Alexandros Nikitas, Simon Parkinson in Deception in Autonomous Transport Systems
    Chapter 2024
Did you find what you were looking for? Share feedback.