[HTML][HTML] Hybrid defense mechanism against malicious packet drop** attack for MANET using game theory

S Vijayalakshmi, S Bose, G Logeswari… - Cyber security and …, 2023 - Elsevier
Ad hoc networks are a new perspective of wireless communication for versatile hosts.
Security is a colossal worry for ad hoc networks, especially for those security-touchy …

Multi-objective seagull optimization algorithm with deep learning-enabled vulnerability detection for secure cloud environments

M Aljebreen, MA Alohali, H Mahgoub, SS Aljameel… - Sensors, 2023 - mdpi.com
Cloud computing (CC) is an internet-enabled environment that provides computing services
such as networking, databases, and servers to clients and organizations in a cost-effective …

Performance comparison analysis of classification methodologies for effective detection of intrusions

R Bingu, S Adinarayana, JS Dhatterwal, S Kavitha… - Computers & …, 2024 - Elsevier
Intrusion detection systems (IDS) are critical in many applications, including cloud
environments. The intrusion poses a security threat and extracts privacy data and …

An intelligent framework for attack detection in the internet of things using coati optimization

T Pandiselvi, GM Karthik, V Jacob, B Nancharaiah - Wireless Networks, 2024 - Springer
Abstract The Internet of Things (IoT) is a develo** technology that shares data in wireless
scenarios. However, the developments in the IoT make connected devices susceptible to …

Defending Web Applications against Malicious Traffic: Leveraging Machine Learning for Enhanced Security

G Logeswari, T Anitha, S Bose… - 2023 International …, 2023 - ieeexplore.ieee.org
As the frequency and complexity of cybersecurity threats continue to rise, it is imperative to
develop novel strategies for preventing and detecting malicious attacks. This paper …

Synergical Model for Proactive Intrusion Detection System in Software Defined Networking

S Bose, N Maheswaran, S Karthika… - 2024 15th …, 2024 - ieeexplore.ieee.org
In Software Defined Networking (SDN), the Intrusion Detection System (IDS) dynamically
analyzes network traffic and detects the presence of suspicious activities or potential security …

MS3F: Maximizing Bandwidth and Data Transmission Performance in SUCCESS-HPON Architecture for WDM-PON Using AI Techniques

T Anitha, S Bose, N Maheswaran… - … on Advances in …, 2023 - ieeexplore.ieee.org
Recent advances in urban and access communication networks have enabled the use of
various technologies, with optical transmission mediums and Wavelength Division …

Transformative Storage Framework for 6G Smart City Deployments

N Maheswaran, S Bose, T Shruthi… - 2024 Third …, 2024 - ieeexplore.ieee.org
The advent of 6G networks is poised to revolutionize the digital landscape by offering
unprecedented data transfer speeds, ultra-low latency, and enhanced connectivity …

Cloud Network Traffic Classification and Intrusion Detection System Using Deep Learning

K Mala, HS Annapurna - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
With the increasing adoption of cloud computing, the security of network traffic and the
detection of intrusions within cloud environments have become paramount concerns. This …

Designing a SDN-Based Intrusion Detection and Mitigation System Using Machine Learning Techniques

G Logeswari, S Bose, T Anitha - International Conference on Advanced …, 2022 - Springer
SDN is a network architectural approach that enables networks to be managed or designed
in an intelligent, centralized manner via software applications. SDN enables network experts …