Search
Search Results
-
A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures
The recent integration and collaboration of robots with networks expose new challenges and problems in terms of security. However, to the best of our...
-
Survey on Botnet Detection Techniques
Due to unpleasant market competition, IT companies are releasing the software or applications without much considering the unintended security... -
Authentication with Bioelectrical Signals
Within a normal range of biological signals, one signal of a subject shows a unique pattern that differentiates it from signals originating from... -
Steganography using wavelet transform for secured data transmission
The secure transfer of data (alphanumeric and byte data) is critical in information technology. In general, cryptography is used to safeguard data...
-
Detecting Semantic Social Engineering Attack in the Context of Information Security
In IEEE 802.11 standard, the management frames are sent unencrypted, so the network name (SSID), MAC address (BSSID), and/or IP address can be easily... -
Probability Boosted Regression for Intrusion Detection in Cyberactive Space
Protecting cyber-physical infrastructure from random network attacks is critical in this age of widespread Internet connectivity. This will prevent... -
Real-Time Human Locator and Advance Home Security Appliances
In this modern era, human safety has become an important issue. In the past years, crimes against girls and children have raised significantly. In... -
Trust-Free Homes: The Zero-Trust Paradigm in a Smart Home Setting
The Internet of Things (IoT) is one of the novel concepts which has taken the world by storm. Although the technology holds many advantages, the... -
Machine Learning for Automotive Cybersecurity: Challenges, Opportunities and Future Directions
Connected autonomous vehicles (CAVs) hold the promise of not only improving functional safety but also improving mobility and the efficiency of... -
DPETAs: Detection and Prevention of Evil Twin Attacks on Wi-Fi Networks
Numerous types of threats could become vulnerable to Wi-Fi networks. In terms of preventing and reducing their effect on the networks, it has become... -
UAV low-altitude obstacle detection based on the fusion of LiDAR and camera
In this paper, aiming at the flying scene of the small unmanned aerial vehicle (UAV) in the low-altitude suburban environment, we choose the sensor...
-
Identification of Face by Using CNN and Deep Learning Algorithms
The development of advanced computers and upgraded cameras have propelled research toward designing facial recognition systems for various facial... -
Maritime Surveillance Using Instance Segmentation Techniques
A maritime surveillance system is vital in detecting objects threatening national security and violating the maritime border. Many small and... -
Credit Card Fraud Detection Using Deep Learning for Internet-of-Things Enabled Smart Digital Financial System
It is crucial to adhere to established protocols and effective techniques to prevent the theft of any sensitive information when paying with a credit... -
Panorama: A Multi-language Software Information Prospecting Facility
This paper concerns the development of both theoretical and operational frameworks, called Panorama, for comprehending large scale, multi-lingual... -
SISA: Securing Images by Selective Alteration
Gaherwar, Prutha Joshi, Shraddha Joshi, Raviraj Khengare, RahulWith an increase in mobile and camera devices’ popularity, digital content in the form... -
Manual and Automatic Control of Appliances Based on Integration of WSN and IOT Technology
As indicated by the Internet of Things, the future home the purported Smart Home, will be a consistent mix of actual savvy objects, interfacing,... -
Critical Analysis of Secure Strategies Against Threats on Cloud Platform
Cloud computing is one of the popular topics of the current internet world. Cloud computing technology no doubt makes life simple and easier by... -
IDS-PSO-BAE: The Ensemble Method for Intrusion Detection System Using Bagging–Autoencoder and PSO
In recent days, for security services, an intrusion detection system (IDS) is a highly effective solution (Louk MHL, Tama BA. “PSO-Driven Feature... -
A New Approach to Coupled IR Sensor-Based Real-Time System for Alerting Elderly People of Accidents in Rest Room
In this paper, an IR sensor-based Real-Time Rest Room system helps in detecting accidents or abrupt falling, or movements of elderly people when they...