Search
Search Results
-
VANET Cluster Based Gray Hole Attack Detection and Prevention
VANET is an emerging technology for intelligent transportation systems in smart cities. Vehicle communication raises many challenges, notably in the...
-
Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3
VANET(Vehicclar ad hoc network) is an extension to MANET(Mobile Ad Hoc Network) that is mainly used for providing communications between different... -
STABA: Secure Trust Based Approach for Black-Hole Attack Detection
The rapid advancement of mobile computing and wireless networking technology has resulted in a massive increase in the number of mobile users around... -
IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks
Wireless Sensor Networks (WSNs) play a vital role in various applications, necessitating robust network security to protect sensitive data. Intrusion...
-
Review of Iris Presentation Attack Detection Competitions
Biometric recognition systems have been shown to be susceptible to presentation attacks, the use of an artificial biometric in place of a live... -
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
The adoption and popularization of mobile devices, such as smartphones and tablets, accentuated after the second decade of this century, has been...
-
Mitigation of black hole attacks using firefly and artificial neural network
In Mobile Ad hoc Network (MANET), network topology changes as devices/users/nodes move and nodes can serve as a source, destination, or router for...
-
Black hole algorithm: A comprehensive survey
This paper provides an in-depth literature review of the Black Hole Algorithm (BHA) which is considered as a recent metaheuristic. BHA has been...
-
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks
One of the network performance challenges of Vehicular Ad Hoc Networks (VANET) is the Black Hole attack. This destructive attack severely damages the...
-
A new efficient approach for detecting single and multiple black hole attacks
Mobile Ad hoc NETworks (MANET) are networks without infrastructure. The communication range among nodes is limited, where several hops are needed to...
-
Homology as an Adversarial Attack Indicator
In this paper we show how classical topological information can be automated with machine learning to lessen the threat of an adversarial attack.... -
Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications
Wireless sensor networks (WSNs) are a critical component of the Internet of Things (IoT) which can be used in various fields, including environmental...
-
Network Security Threats Detection Methods Based on Machine Learning Techniques
The world is now interconnected to share information and resources in a significant manner. The network must support its integrity and network... -
An Improved AODV Routing Algorithm for Detection of Wormhole and Sybil Attacks in MANET
Wireless sensor network is a promising technology in the current scenario due to its wider area of research. With the advancement of technology,... -
TFRA: Trajectory-Based Message Ferry Recognition Attack in UAV Network
The introduction of ferry UAVs (message ferry) in the UAV network is an effective means to solve the cooperative communication of multiple UAVs. The... -
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
The internet of things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present...
-
Prevention and Detection of Network Attacks: A Comprehensive Study
Cybersecurity is currently a topic of utmost significance in tech sectors. The ever-evolving landscape of this field makes it particularly difficult... -
Image Watermarking Backdoor Attacks in CNN-Based Classification Tasks
In these last years, neural networks are becoming the basis for different kinds of applications and this is mainly due to the stunning performances... -
Planning for Network Security
The Internet allows an attacker to attack from anywhere in the world from their home desk. They just need to find one vulnerability, while a security... -
Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network
Wireless sensor networks (WSNs) are increasingly being used for data monitoring and collection purposes. Typically, they consist of a large number of...