A machine learning based intrusion detection system for mobile Internet of Things
Intrusion detection systems plays a pivotal role in detecting malicious activities that
denigrate the performance of the network. Mobile adhoc networks (MANETs) and wireless …
denigrate the performance of the network. Mobile adhoc networks (MANETs) and wireless …
[PDF][PDF] A literature survey on security issues of WSN and different types of attacks in network
M Pawar, J Agarwal - Indian J. Comput. Sci. Eng, 2017 - ijcse.com
This review work present a gist of security issues related to the WSN network and discusses
different types of attacks in the network. Sensor nodes, when deployed to form a network of …
different types of attacks in the network. Sensor nodes, when deployed to form a network of …
A game theory based multi layered intrusion detection framework for VANET
Abstract Vehicular Ad-hoc Networks (VANETs) are vulnerable to various type of network
attacks like Blackhole attack, Denial of Service (DoS), Sybil attack etc. Intrusion Detection …
attacks like Blackhole attack, Denial of Service (DoS), Sybil attack etc. Intrusion Detection …
Performance analysis of AODV routing protocol in MANET under the influence of routing attacks
In the recent years, lots of research are going on in the area of Mobile Ad hoc NETworks
(MANETs). This network is infrastructure-less network where nodes communicate with each …
(MANETs). This network is infrastructure-less network where nodes communicate with each …
A detection and prevention system against collaborative attacks in mobile ad hoc networks
Abstract Mobile Ad hoc Networks (MANETs) are vulnerable to various kinds of threats due to
their dynamic nature and lack of a central point of control. Collaborative attacks occur when …
their dynamic nature and lack of a central point of control. Collaborative attacks occur when …
FAPRP: A machine learning approach to flooding attacks prevention routing protocol in mobile ad hoc networks
Request route flooding attack is one of the main challenges in the security of Mobile Ad Hoc
Networks (MANETs) as it is easy to initiate and difficult to prevent. A malicious node can …
Networks (MANETs) as it is easy to initiate and difficult to prevent. A malicious node can …
A source anonymity-based lightweight secure AODV protocol for fog-based MANET
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc
network with the advantages of both mobility and fog computing. Meanwhile, as traditional …
network with the advantages of both mobility and fog computing. Meanwhile, as traditional …
A physical process for recycling and reusing waste printed circuit boards
M Peng, W Layiding, X Dong… - … on Electronics and …, 2004 - ieeexplore.ieee.org
This paper presents a practical physical process for recycling waste printed circuit boards
(PCBs) as well as the reusing process for epoxy resin recovered from PCBs. A special …
(PCBs) as well as the reusing process for epoxy resin recovered from PCBs. A special …
Impact of DoS attack in IoT system and identifying the attacker location for interference attacks
S Sinha - … 6th international conference on communication and …, 2021 - ieeexplore.ieee.org
Security in Internet of Things (IoT) is major concerned today. RPL is one of the protocols
used in network layer of IoT and vulnerable to different types of attack. DoS attack is one of …
used in network layer of IoT and vulnerable to different types of attack. DoS attack is one of …
[PDF][PDF] International journal of advanced research in computer science and software engineering
Tumor segmentation from magnetic resonance imaging (MRI) data is an important but time
consuming manual task performed by medical experts. Automating this process is a …
consuming manual task performed by medical experts. Automating this process is a …