[HTML][HTML] Hybrid defense mechanism against malicious packet drop** attack for MANET using game theory
Ad hoc networks are a new perspective of wireless communication for versatile hosts.
Security is a colossal worry for ad hoc networks, especially for those security-touchy …
Security is a colossal worry for ad hoc networks, especially for those security-touchy …
Multi-objective seagull optimization algorithm with deep learning-enabled vulnerability detection for secure cloud environments
Cloud computing (CC) is an internet-enabled environment that provides computing services
such as networking, databases, and servers to clients and organizations in a cost-effective …
such as networking, databases, and servers to clients and organizations in a cost-effective …
Performance comparison analysis of classification methodologies for effective detection of intrusions
Intrusion detection systems (IDS) are critical in many applications, including cloud
environments. The intrusion poses a security threat and extracts privacy data and …
environments. The intrusion poses a security threat and extracts privacy data and …
An intelligent framework for attack detection in the internet of things using coati optimization
Abstract The Internet of Things (IoT) is a develo** technology that shares data in wireless
scenarios. However, the developments in the IoT make connected devices susceptible to …
scenarios. However, the developments in the IoT make connected devices susceptible to …
Defending Web Applications against Malicious Traffic: Leveraging Machine Learning for Enhanced Security
As the frequency and complexity of cybersecurity threats continue to rise, it is imperative to
develop novel strategies for preventing and detecting malicious attacks. This paper …
develop novel strategies for preventing and detecting malicious attacks. This paper …
Synergical Model for Proactive Intrusion Detection System in Software Defined Networking
In Software Defined Networking (SDN), the Intrusion Detection System (IDS) dynamically
analyzes network traffic and detects the presence of suspicious activities or potential security …
analyzes network traffic and detects the presence of suspicious activities or potential security …
MS3F: Maximizing Bandwidth and Data Transmission Performance in SUCCESS-HPON Architecture for WDM-PON Using AI Techniques
Recent advances in urban and access communication networks have enabled the use of
various technologies, with optical transmission mediums and Wavelength Division …
various technologies, with optical transmission mediums and Wavelength Division …
Transformative Storage Framework for 6G Smart City Deployments
The advent of 6G networks is poised to revolutionize the digital landscape by offering
unprecedented data transfer speeds, ultra-low latency, and enhanced connectivity …
unprecedented data transfer speeds, ultra-low latency, and enhanced connectivity …
Cloud Network Traffic Classification and Intrusion Detection System Using Deep Learning
K Mala, HS Annapurna - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
With the increasing adoption of cloud computing, the security of network traffic and the
detection of intrusions within cloud environments have become paramount concerns. This …
detection of intrusions within cloud environments have become paramount concerns. This …
Designing a SDN-Based Intrusion Detection and Mitigation System Using Machine Learning Techniques
SDN is a network architectural approach that enables networks to be managed or designed
in an intelligent, centralized manner via software applications. SDN enables network experts …
in an intelligent, centralized manner via software applications. SDN enables network experts …