Search
Search Results
-
Intrusion Detection System in Wireless Sensor Network Using Conditional Generative Adversarial Network
Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for...
-
A Model-Based System for Intrusion Detection Using Novel Technique-Hidden Markov Bayesian in Wireless Sensor Network
Intrusion detection is one of the major challenges faced in wireless communications. The wireless network, where tiny sensors are comprised with... -
IoT-Based Home Intrusion Detection System for Enhanced Smart Environment
An interconnected collection of smart devices which is expanding at a very rapid pace as many devices and sensors are being added to the inter or... -
Wireless Room Surveillance System
The wireless room surveillance system described in this project leverages various electronic components, such as NodeMCU, buzzer, LEDs, metal... -
Hardware Implementation of KLT Tracker for Real-Time Intruder Detection and Tracking Using On-board Camera
This paper presents the hardware implementation of a new hybrid KLT (Kanade–Lucas–Tomasi) algorithm for the sake of real-time intruder detection and...
-
Enhancing Smart Home Security Using Deep Convolutional Neural Networks and Multiple Cameras
With the increasing use of smart homes and IoT devices, security has become a significant concern. This paper presents a method to enhance smart home...
-
An Efficient and Lightweight Intrusion Detection System for Mobile Ad Hoc Networks
The distinctive aspects of Mobile Ad Hoc Networks (MANETs), including dynamic network topology, susceptible wireless medium, and limited battery... -
Attack detection and securer data transmission in cognitive radio networks using BMHHO-ENN and SHA2-RSA
The attention of the researchers has highly turned towards the Cognitive Radio Networks (CRN) due to its high efficiency and throughput performance....
-
Anti-theft System Using Structural Similarity
Conventional security systems often fall short in effectively tracking lost items, exposing a critical gap in their functionality. Most of these... -
Detection of DoS Attacks on Wi-Fi Networks Using IoT Sensors
IoT has become a primary target for data theft. There is a legal risk if disconnection of a user from a network occurs frequently. Moreover, service... -
Heterogeneous Multi-robot Adversarial Patrolling Using Polymatrix Games
We consider the problem of patrolling an area with a heterogeneous multi-robot team. The goal for the patrolling robots is to detect intrusions while... -
Programmable Feedback Shift Register
Conventionally, a linear feedback shift register (LFSR) constitutes linear sets of sequences with predictable periods, which are considered...
-
Smart Homes of Tomorrow: IoT-Enabled Lifestyle Enhancements
The rapid advancement of the Internet of Things (IoT) is poised to revolutionize business landscapes, particularly in wireless communication... -
A Fog-Based Attack Detection Model Using Deep Learning for the Internet of Medical Things
Internet of Medical Things (IoMT) applications have advanced and become more widespread in recent years. This has driven the need to secure IoMT... -
A Framework for Automatic Wireless Alert System for Explosive Detection
The recent nuclear crisis at Pulwama, India, on February 14, 2019, by extremists is a serious alarming condition. It is essential to avoid loss of... -
Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment
With the advancement of network security, intrusion detection system (IDS) is increasingly used for network-connected environments. As the work of...
-
Dependability
It is said that Nobel Laureate Hannes Alfven once remarked that in Technology Paradise no acts of God can be permitted and everything happens... -
Naive Bayes Classifier-Based Smishing Detection Framework to Reduce Cyber Attack
With the advancement of IT innovation, mobile computing expertise has lately become more widely used by humans. Through the use of sophisticated... -
Humans as path-finders for mobile robots using teach-by-showing navigation
One of the most important barriers towards a widespread use of mobile robots in unstructured, human populated and possibly a-priori unknown work...
-
Dynamic Intrusion Detection Algorithm for Power Information Network Based on Data Flow Characteristics
In the power information system, various intrusion means threaten the information network environment. Network security intrusion detection can...