Search
Search Results
-
Blockchain transaction model based on malicious node detection network
In this day and age, blockchain technology has become very popular. More and more transactions have been completed through the blockchain platform....
-
SECURE TRUST: a blockchain-enabled trust and reputation system for malicious node detection in IOT networks
This study presents SECURE TRUST, a novel blockchain-enabled trust and reputation system designed to address the growing security risks associated...
-
Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN
The widespread use of hierarchical wireless sensor networks (HWSN) in various industries, including environmental monitoring, healthcare, and...
-
What’s Inside a Node? Malicious IPFS Nodes Under the Magnifying Glass
InterPlanetary File System (IPFS) is one of the most promising decentralized off-chain storage mechanisms, particularly relevant for blockchains,... -
Malicious Sensor Node Extraction from Infested Acoustic Signals in Underwater Wireless Sensor Networks
Existing works in underwater localization depend on acoustic signals for echosounding services. However, echosounders suffer from positioning errors... -
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks
The Wireless Sensor Networks (WSNs) used for the monitoring applications like pipelines carrying oil, water, and gas; perimeter surveillance; border...
-
MAIDS: malicious agent identification-based data security model for cloud environments
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage,...
-
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms
AbstractThis paper presents a study of the possibility of using machine learning methods to detect malicious installation files related to the type...
-
SUDV: Malicious fog node management framework for software update dissemination in connected vehicles
Modern vehicles are developed with increasing levels of automation and connectivity. To improve the driving experience, the software requires...
-
Blockchain-based multi-malicious double-spending attack blacklist management model
In recent years, blockchain security issues have attracted widespread attention. Especially in terms of computing power security, when nodes have...
-
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
The domain name system (DNS) protocol has been used for over three decades. It plays a vital role in the functioning of the Internet by facilitating...
-
MVDroid: an android malicious VPN detector using neural networks
The majority of Virtual Private Networks (VPNs) fail when it comes to protecting our privacy. If we are using a VPN to protect our online privacy,...
-
Picker Blinder: a framework for automatic injection of malicious inter-app communication
Malware writers, with the aim to elude the current detection mechanism implemented by commercial and free anti-malware, are finding new ways to...
-
MedGraph: malicious edge detection in temporal reciprocal graph via multi-head attention-based GNN
With the popularity of various online dating applications, it has become a crucial task to detect anomalous or malicious users from a large number of...
-
Fault Tolerance in Vehicular Cloud Networks: Link Failure and Malicious Node Detection and Reconfiguration
Vehicular cloud networks (VCNs) are becoming more popular these days due to their applicability in multifarious applications across the globe. The... -
An intelligent identification and classification system for malicious uniform resource locators (URLs)
Uniform Resource Locator (URL) is a unique identifier composed of protocol and domain name used to locate and retrieve a resource on the Internet....
-
PUMD: a PU learning-based malicious domain detection framework
Domain name system (DNS), as one of the most critical internet infrastructure, has been abused by various cyber attacks. Current malicious domain...
-
Detection of Malicious Node in VANETs Using Digital Twin
Vehicular ad-hoc network (VANET) plays an essential role in hel** the development of smart cars and intelligent transportation systems. By easing... -
GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment
Cloud computing is the most useful computing technology for the new service progression. Due to the distributed nature of cloud computing, security...
-
Design of Anti Machine Learning Malicious Node System Based on Blockchain
In order to solve the problem of security and privacy in machine learning, researchers have proposed many distributed solutions to protect data...