We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 537 results
  1. Intrusion Detection System in Wireless Sensor Network Using Conditional Generative Adversarial Network

    Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for...

    Tanya Sood, Satyartha Prakash, ... Hemant Choubey in Wireless Personal Communications
    Article 31 May 2022
  2. A Model-Based System for Intrusion Detection Using Novel Technique-Hidden Markov Bayesian in Wireless Sensor Network

    Intrusion detection is one of the major challenges faced in wireless communications. The wireless network, where tiny sensors are comprised with...
    Conference paper 2022
  3. IoT-Based Home Intrusion Detection System for Enhanced Smart Environment

    An interconnected collection of smart devices which is expanding at a very rapid pace as many devices and sensors are being added to the inter or...
    Aman Shah, Rukmani Panjanathan, ... Benson Edwin Raj in Proceedings of the International Conference on Cognitive and Intelligent Computing
    Conference paper 2022
  4. Wireless Room Surveillance System

    The wireless room surveillance system described in this project leverages various electronic components, such as NodeMCU, buzzer, LEDs, metal...
    Pinna Murali Krishna, Achanta Tharun Kumar, ... Shakti Raj Chopra in ICT Analysis and Applications
    Conference paper 2023
  5. Hardware Implementation of KLT Tracker for Real-Time Intruder Detection and Tracking Using On-board Camera

    This paper presents the hardware implementation of a new hybrid KLT (Kanade–Lucas–Tomasi) algorithm for the sake of real-time intruder detection and...

    Taehyeong Nam, Seho Kim, Dongwon Jung in International Journal of Aeronautical and Space Sciences
    Article 19 January 2019
  6. Enhancing Smart Home Security Using Deep Convolutional Neural Networks and Multiple Cameras

    With the increasing use of smart homes and IoT devices, security has become a significant concern. This paper presents a method to enhance smart home...

    Rishi Sharma, Anjali Potnis, Vijayshri Chaurasia in Wireless Personal Communications
    Article 01 June 2024
  7. An Efficient and Lightweight Intrusion Detection System for Mobile Ad Hoc Networks

    The distinctive aspects of Mobile Ad Hoc Networks (MANETs), including dynamic network topology, susceptible wireless medium, and limited battery...
    Y. Sharmasth Vali, N. Prakash, L. Shakkeera in Recent Trends in Design, Materials and Manufacturing
    Conference paper 2022
  8. Attack detection and securer data transmission in cognitive radio networks using BMHHO-ENN and SHA2-RSA

    The attention of the researchers has highly turned towards the Cognitive Radio Networks (CRN) due to its high efficiency and throughput performance....

    K. J. Prasanna Venkatesan, S. Shanmughavel in Soft Computing
    Article 06 November 2021
  9. Anti-theft System Using Structural Similarity

    Conventional security systems often fall short in effectively tracking lost items, exposing a critical gap in their functionality. Most of these...
    Conference paper 2024
  10. Detection of DoS Attacks on Wi-Fi Networks Using IoT Sensors

    IoT has become a primary target for data theft. There is a legal risk if disconnection of a user from a network occurs frequently. Moreover, service...
    Irene Joseph, Prasad B. Honnavalli, B. R. Charanraj in Sustainable Advanced Computing
    Conference paper 2022
  11. Heterogeneous Multi-robot Adversarial Patrolling Using Polymatrix Games

    We consider the problem of patrolling an area with a heterogeneous multi-robot team. The goal for the patrolling robots is to detect intrusions while...
    Alexander Langley, Vikas Dhiman, Henrik Christensen in Advances in Automation, Mechanical and Design Engineering
    Conference paper 2023
  12. Programmable Feedback Shift Register

    Conventionally, a linear feedback shift register (LFSR) constitutes linear sets of sequences with predictable periods, which are considered...

    Article 11 March 2023
  13. Smart Homes of Tomorrow: IoT-Enabled Lifestyle Enhancements

    The rapid advancement of the Internet of Things (IoT) is poised to revolutionize business landscapes, particularly in wireless communication...
    Priyanka Patel, Krishna Gevariya, Rency Kapadia in ICT: Cyber Security and Applications
    Conference paper 2024
  14. A Fog-Based Attack Detection Model Using Deep Learning for the Internet of Medical Things

    Internet of Medical Things (IoMT) applications have advanced and become more widespread in recent years. This has driven the need to secure IoMT...
    Yahya Rbah, Mohammed Mahfoudi, ... Benaissa Bernoussi in Artificial Intelligence, Data Science and Applications
    Conference paper 2024
  15. A Framework for Automatic Wireless Alert System for Explosive Detection

    The recent nuclear crisis at Pulwama, India, on February 14, 2019, by extremists is a serious alarming condition. It is essential to avoid loss of...
    Ankita Chandavale, C. Anjali, ... Niketa Gandhi in Proceedings of International Conference on Computational Intelligence
    Conference paper 2023
  16. Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment

    With the advancement of network security, intrusion detection system (IDS) is increasingly used for network-connected environments. As the work of...

    Article 02 August 2023
  17. Dependability

    It is said that Nobel Laureate Hannes Alfven once remarked that in Technology Paradise no acts of God can be permitted and everything happens...
    Hermann Kopetz, Wilfried Steiner in Real-Time Systems
    Chapter 2022
  18. Naive Bayes Classifier-Based Smishing Detection Framework to Reduce Cyber Attack

    With the advancement of IT innovation, mobile computing expertise has lately become more widely used by humans. Through the use of sophisticated...
    Gaganpreet Kaur, Kiran Deep Singh, ... A. V. Senthil Kumar in Mobile Radio Communications and 5G Networks
    Conference paper 2024
  19. Humans as path-finders for mobile robots using teach-by-showing navigation

    One of the most important barriers towards a widespread use of mobile robots in unstructured, human populated and possibly a-priori unknown work...

    Alessandro Antonucci, Paolo Bevilacqua, ... Daniele Fontanelli in Autonomous Robots
    Article Open access 17 August 2023
  20. Dynamic Intrusion Detection Algorithm for Power Information Network Based on Data Flow Characteristics

    In the power information system, various intrusion means threaten the information network environment. Network security intrusion detection can...
    Huang Chao, Dong Liang, ... Dai Dangdang in Advances in Communication, Devices and Networking
    Conference paper 2023
Did you find what you were looking for? Share feedback.