[PDF][PDF] Internet of vehicles (IoV) requirements, attacks and countermeasures

A Samad, S Alam, S Mohammed… - Proceedings of 12th …, 2018 - academia.edu
Technology is moving towards more intelligent and more connected devices in this digital
world. Transport system is also not untouched with this phenomenon. Vehicles are …

Auto encryption algorithm for uploading data on cloud storage

M Tajammul, R Parveen - International Journal of Information Technology, 2020 - Springer
Cloud computing is a scalable, reliable, and fast growing technology. It offers a no. of
services to the users on pay per use basis. These services includes: computation, storage …

Analysing and securing the sustainability of e-Government projects from technical aspect using employees perspective approach

J Yadav, AK Saini, AK Yadav - International Journal of Information …, 2019 - Springer
Sustainability of eGovernment projects in develo** countries is an evolving area, in 1987
India has started its major computerization in government sector by launching the national …

A modified framework to detect keyloggers using machine learning algorithm

D Pillai, I Siddavatam - International Journal of Information Technology, 2019 - Springer
Keyloggers are very dangerous programs that does the monitoring of all the activities carried
in our PC. Some of the activities include capturing screenshots of all the activities performed …

Synthesized hybrid ZRP through aggregated routes

D Mehta, I Kashyap, S Zafar - International Journal of Information …, 2018 - Springer
Routing issues pertaining to Mobile adhoc networks (MANET) have been under scrutiny
over the past many years. The rigorous researches have yielded proactive and reactive …

Pattern matching for the iris biometric recognition system uses KNN and fuzzy logic classifier techniques

V Chirchi, E Chirchi, KE Chirchi - International Journal of Information …, 2024 - Springer
This research introduces novel iris biometric authentication methods employing wavelength
rectangular coding (WRC) and enhanced isocentric segmentation (EISOS). By categorizing …

Knowledge Analytics in IOMT‐MANET Through QoS Optimization for Sustainability

N Sharma, N Iftekhar, S Khan - Smart and Sustainable …, 2022 - Wiley Online Library
Summary Internet of Things (IoT) is a well‐known term used nowadays and the reason
behind its popularity is its vast range of applications to target real‐time problems. Internet of …

Strengthening the bitcoin safety: a graded span based key partitioning mechanism

H Rehman, UA Khan, M Nazir, K Mustafa - International Journal of …, 2020 - Springer
Bitcoin has emerged as a successful digital currency since its inception in 2009. Now it is
more likely becoming as a digital asset. The private key provides the complete control on …

Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET

S Zafar, S Khan, N Iftekhar, SS Biswas - Forensic Investigations and …, 2020 - igi-global.com
This chapter overviews and characterizes the protected steering convention in MANET, and
furthermore, it discusses the proposed technique for alleviating those assaults. In the …

Computational Hybrid Approaches for Routing and Security Optimization in Networks

N Iftekhar, S Zafar, S Khan, SS Biswas - … Revised Selected Papers, Part I 5, 2020 - Springer
Abstract Portable Ad-hoc Network also referred as Mobile ad-hoc Networks (MANET) is a no
established, foundation less system worked for different military, law, salvage activities and …