We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 367 results
  1. VANET Cluster Based Gray Hole Attack Detection and Prevention

    VANET is an emerging technology for intelligent transportation systems in smart cities. Vehicle communication raises many challenges, notably in the...

    Gurtej Kaur, Meenu Khurana, Amandeep Kaur in SN Computer Science
    Article 10 January 2024
  2. Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3

    VANET(Vehicclar ad hoc network) is an extension to MANET(Mobile Ad Hoc Network) that is mainly used for providing communications between different...
    Dhananjay Yadav, Nirbhay K. Chaubey in Advancements in Smart Computing and Information Security
    Conference paper 2022
  3. STABA: Secure Trust Based Approach for Black-Hole Attack Detection

    The rapid advancement of mobile computing and wireless networking technology has resulted in a massive increase in the number of mobile users around...
    Virendra Dani, Priyanka Kokate, Jayesh Umre in Applications of Artificial Intelligence and Machine Learning
    Conference paper 2022
  4. IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks

    Wireless Sensor Networks (WSNs) play a vital role in various applications, necessitating robust network security to protect sensitive data. Intrusion...

    Vandana Shakya, Jaytrilok Choudhary, Dhirendra Pratap Singh in Multimedia Tools and Applications
    Article 08 February 2024
  5. Review of Iris Presentation Attack Detection Competitions

    Biometric recognition systems have been shown to be susceptible to presentation attacks, the use of an artificial biometric in place of a live...
    David Yambay, Priyanka Das, ... Sébastien Marcel in Handbook of Biometric Anti-Spoofing
    Chapter 2023
  6. Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

    The adoption and popularization of mobile devices, such as smartphones and tablets, accentuated after the second decade of this century, has been...

    Francisco T. Chimuco, João B. F. Sequeiros, ... Pedro R. M. Inácio in International Journal of Information Security
    Article Open access 17 February 2023
  7. Mitigation of black hole attacks using firefly and artificial neural network

    In Mobile Ad hoc Network (MANET), network topology changes as devices/users/nodes move and nodes can serve as a source, destination, or router for...

    Pooja Rani, Kavita, ... Sonali Dash in Neural Computing and Applications
    Article 07 February 2022
  8. Black hole algorithm: A comprehensive survey

    This paper provides an in-depth literature review of the Black Hole Algorithm (BHA) which is considered as a recent metaheuristic. BHA has been...

    Laith Abualigah, Mohamed Abd Elaziz, ... Amir H. Gandomi in Applied Intelligence
    Article 30 January 2022
  9. BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks

    One of the network performance challenges of Vehicular Ad Hoc Networks (VANET) is the Black Hole attack. This destructive attack severely damages the...

    Ngoc T. Luong, Doan Hoang in International Journal of Information Security
    Article 04 June 2023
  10. A new efficient approach for detecting single and multiple black hole attacks

    Mobile Ad hoc NETworks (MANET) are networks without infrastructure. The communication range among nodes is limited, where several hops are needed to...

    Rachid Khalladi, Mohammed Rebbah, Omar Smail in The Journal of Supercomputing
    Article 08 January 2021
  11. Homology as an Adversarial Attack Indicator

    In this paper we show how classical topological information can be automated with machine learning to lessen the threat of an adversarial attack....
    Ira S. Moskowitz, Nolan Bay, ... Arnold Tunick in Adversary-Aware Learning Techniques and Trends in Cybersecurity
    Chapter 2021
  12. Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications

    Wireless sensor networks (WSNs) are a critical component of the Internet of Things (IoT) which can be used in various fields, including environmental...

    Vishal Sharma, Rohit Beniwal, Vinod Kumar in The Journal of Supercomputing
    Article 23 January 2024
  13. Network Security Threats Detection Methods Based on Machine Learning Techniques

    The world is now interconnected to share information and resources in a significant manner. The network must support its integrity and network...
    Conference paper 2024
  14. An Improved AODV Routing Algorithm for Detection of Wormhole and Sybil Attacks in MANET

    Wireless sensor network is a promising technology in the current scenario due to its wider area of research. With the advancement of technology,...
    Shreeya Mishra, Umesh Kumar, Komal Mehta Bhagat in Smart Trends in Computing and Communications
    Conference paper 2023
  15. TFRA: Trajectory-Based Message Ferry Recognition Attack in UAV Network

    The introduction of ferry UAVs (message ferry) in the UAV network is an effective means to solve the cooperative communication of multiple UAVs. The...
    Yuting Wu, Yulei Liu, ... Qian Zhou in Wireless Algorithms, Systems, and Applications
    Conference paper 2021
  16. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

    The internet of things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present...

    Kobra Mabodi, Mehdi Yusefi, ... Reza Fotohi in The Journal of Supercomputing
    Article 10 January 2020
  17. Prevention and Detection of Network Attacks: A Comprehensive Study

    Cybersecurity is currently a topic of utmost significance in tech sectors. The ever-evolving landscape of this field makes it particularly difficult...
    Conference paper 2023
  18. Image Watermarking Backdoor Attacks in CNN-Based Classification Tasks

    In these last years, neural networks are becoming the basis for different kinds of applications and this is mainly due to the stunning performances...
    Conference paper 2023
  19. Planning for Network Security

    The Internet allows an attacker to attack from anywhere in the world from their home desk. They just need to find one vulnerability, while a security...
    Chapter 2024
  20. Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network

    Wireless sensor networks (WSNs) are increasingly being used for data monitoring and collection purposes. Typically, they consist of a large number of...

    Salim Salmi, Lahcen Oughdir in Journal of Big Data
    Article Open access 07 February 2023
Did you find what you were looking for? Share feedback.