[PDF][PDF] Internet of vehicles (IoV) requirements, attacks and countermeasures
Technology is moving towards more intelligent and more connected devices in this digital
world. Transport system is also not untouched with this phenomenon. Vehicles are …
world. Transport system is also not untouched with this phenomenon. Vehicles are …
Auto encryption algorithm for uploading data on cloud storage
Cloud computing is a scalable, reliable, and fast growing technology. It offers a no. of
services to the users on pay per use basis. These services includes: computation, storage …
services to the users on pay per use basis. These services includes: computation, storage …
Analysing and securing the sustainability of e-Government projects from technical aspect using employees perspective approach
Sustainability of eGovernment projects in develo** countries is an evolving area, in 1987
India has started its major computerization in government sector by launching the national …
India has started its major computerization in government sector by launching the national …
A modified framework to detect keyloggers using machine learning algorithm
D Pillai, I Siddavatam - International Journal of Information Technology, 2019 - Springer
Keyloggers are very dangerous programs that does the monitoring of all the activities carried
in our PC. Some of the activities include capturing screenshots of all the activities performed …
in our PC. Some of the activities include capturing screenshots of all the activities performed …
Synthesized hybrid ZRP through aggregated routes
Routing issues pertaining to Mobile adhoc networks (MANET) have been under scrutiny
over the past many years. The rigorous researches have yielded proactive and reactive …
over the past many years. The rigorous researches have yielded proactive and reactive …
Pattern matching for the iris biometric recognition system uses KNN and fuzzy logic classifier techniques
This research introduces novel iris biometric authentication methods employing wavelength
rectangular coding (WRC) and enhanced isocentric segmentation (EISOS). By categorizing …
rectangular coding (WRC) and enhanced isocentric segmentation (EISOS). By categorizing …
Knowledge Analytics in IOMT‐MANET Through QoS Optimization for Sustainability
Summary Internet of Things (IoT) is a well‐known term used nowadays and the reason
behind its popularity is its vast range of applications to target real‐time problems. Internet of …
behind its popularity is its vast range of applications to target real‐time problems. Internet of …
Strengthening the bitcoin safety: a graded span based key partitioning mechanism
Bitcoin has emerged as a successful digital currency since its inception in 2009. Now it is
more likely becoming as a digital asset. The private key provides the complete control on …
more likely becoming as a digital asset. The private key provides the complete control on …
Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET
This chapter overviews and characterizes the protected steering convention in MANET, and
furthermore, it discusses the proposed technique for alleviating those assaults. In the …
furthermore, it discusses the proposed technique for alleviating those assaults. In the …
Computational Hybrid Approaches for Routing and Security Optimization in Networks
Abstract Portable Ad-hoc Network also referred as Mobile ad-hoc Networks (MANET) is a no
established, foundation less system worked for different military, law, salvage activities and …
established, foundation less system worked for different military, law, salvage activities and …