We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Blockchain transaction model based on malicious node detection network

    In this day and age, blockchain technology has become very popular. More and more transactions have been completed through the blockchain platform....

    **ao-Ai Miao, Tao Liu in Multimedia Tools and Applications
    Article 11 October 2023
  2. SECURE TRUST: a blockchain-enabled trust and reputation system for malicious node detection in IOT networks

    This study presents SECURE TRUST, a novel blockchain-enabled trust and reputation system designed to address the growing security risks associated...

    Serin V. Simpson, Y. Ravi Raju, ... Gopika Venu in International Journal of Information Technology
    Article 13 September 2023
  3. Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN

    The widespread use of hierarchical wireless sensor networks (HWSN) in various industries, including environmental monitoring, healthcare, and...

    Article 10 January 2023
  4. What’s Inside a Node? Malicious IPFS Nodes Under the Magnifying Glass

    InterPlanetary File System (IPFS) is one of the most promising decentralized off-chain storage mechanisms, particularly relevant for blockchains,...
    Christos Karapapas, George C. Polyzos, Constantinos Patsakis in ICT Systems Security and Privacy Protection
    Conference paper 2024
  5. Malicious Sensor Node Extraction from Infested Acoustic Signals in Underwater Wireless Sensor Networks

    Existing works in underwater localization depend on acoustic signals for echosounding services. However, echosounders suffer from positioning errors...
    Prateek, Rajeev Arya in Security, Privacy and Data Analytics
    Conference paper 2023
  6. Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks

    The Wireless Sensor Networks (WSNs) used for the monitoring applications like pipelines carrying oil, water, and gas; perimeter surveillance; border...

    Kaushal Shah, Devesh **wala in Frontiers of Computer Science
    Article 03 August 2021
  7. MAIDS: malicious agent identification-based data security model for cloud environments

    With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage,...

    Kishu Gupta, Deepika Saxena, ... Ashutosh Kumar Singh in Cluster Computing
    Article 23 February 2024
  8. Features of Detecting Malicious Installation Files Using Machine Learning Algorithms

    Abstract

    This paper presents a study of the possibility of using machine learning methods to detect malicious installation files related to the type...

    P. E. Yugai, E. V. Zhukovskii, P. O. Semenov in Automatic Control and Computer Sciences
    Article 01 December 2023
  9. SUDV: Malicious fog node management framework for software update dissemination in connected vehicles

    Modern vehicles are developed with increasing levels of automation and connectivity. To improve the driving experience, the software requires...

    Nadia Kalsoom, Asad Waqar Malik, ... Arsalan Ahmad in The Journal of Supercomputing
    Article 28 September 2022
  10. Blockchain-based multi-malicious double-spending attack blacklist management model

    In recent years, blockchain security issues have attracted widespread attention. Especially in terms of computing power security, when nodes have...

    JunLu Wang, Qiang Liu, Baoyan Song in The Journal of Supercomputing
    Article 08 April 2022
  11. Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition

    The domain name system (DNS) protocol has been used for over three decades. It plays a vital role in the functioning of the Internet by facilitating...

    Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma in International Journal of Information Security
    Article 15 December 2023
  12. MVDroid: an android malicious VPN detector using neural networks

    The majority of Virtual Private Networks (VPNs) fail when it comes to protecting our privacy. If we are using a VPN to protect our online privacy,...

    Saeed Seraj, Siavash Khodambashi, ... Nikolaos Polatidis in Neural Computing and Applications
    Article 03 April 2023
  13. Picker Blinder: a framework for automatic injection of malicious inter-app communication

    Malware writers, with the aim to elude the current detection mechanism implemented by commercial and free anti-malware, are finding new ways to...

    Rosangela Casolare, Stefano Fagnano, ... Antonella Santone in Journal of Computer Virology and Hacking Techniques
    Article 12 January 2024
  14. MedGraph: malicious edge detection in temporal reciprocal graph via multi-head attention-based GNN

    With the popularity of various online dating applications, it has become a crucial task to detect anomalous or malicious users from a large number of...

    Kai Chen, Ziao Wang, ... Linhao Luo in Neural Computing and Applications
    Article 07 January 2023
  15. Fault Tolerance in Vehicular Cloud Networks: Link Failure and Malicious Node Detection and Reconfiguration

    Vehicular cloud networks (VCNs) are becoming more popular these days due to their applicability in multifarious applications across the globe. The...
    Sandeep N. Kugali, Bibhu Kalyan Mishra, ... Malaya Malla in Proceedings of the International Health Informatics Conference
    Conference paper 2023
  16. An intelligent identification and classification system for malicious uniform resource locators (URLs)

    Uniform Resource Locator (URL) is a unique identifier composed of protocol and domain name used to locate and retrieve a resource on the Internet....

    Qasem Abu Al-Haija, Mustafa Al-Fayoumi in Neural Computing and Applications
    Article 20 April 2023
  17. PUMD: a PU learning-based malicious domain detection framework

    Domain name system (DNS), as one of the most critical internet infrastructure, has been abused by various cyber attacks. Current malicious domain...

    Zhaoshan Fan, Qing Wang, ... Yuling Liu in Cybersecurity
    Article Open access 01 October 2022
  18. Detection of Malicious Node in VANETs Using Digital Twin

    Vehicular ad-hoc network (VANET) plays an essential role in hel** the development of smart cars and intelligent transportation systems. By easing...
    Varsha Arya, Akshat Gaurav, ... Hojjat Baghban in Big Data Intelligence and Computing
    Conference paper 2023
  19. GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment

    Cloud computing is the most useful computing technology for the new service progression. Due to the distributed nature of cloud computing, security...

    M. Arunkumar, K. Ashok Kumar in International Journal of Information Technology
    Article 13 March 2023
  20. Design of Anti Machine Learning Malicious Node System Based on Blockchain

    In order to solve the problem of security and privacy in machine learning, researchers have proposed many distributed solutions to protect data...
    Yuanzhen Liu, Yanbo Yang, ... Baoshan Li in Cyberspace Safety and Security
    Conference paper 2022
Did you find what you were looking for? Share feedback.