Graph theory: A comprehensive survey about graph theory applications in computer science and social networks
A Majeed, I Rauf - Inventions, 2020 - mdpi.com
Graph theory (GT) concepts are potentially applicable in the field of computer science (CS)
for many purposes. The unique applications of GT in the CS field such as clustering of web …
for many purposes. The unique applications of GT in the CS field such as clustering of web …
Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning
Abstract This research builds Security Information & Event Management (SIEM) based on
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …
A review of cyber vigilance tasks for network defense
The capacity to sustain attention to virtual threat landscapes has led cyber security to
emerge as a new and novel domain for vigilance research. However, unlike classic …
emerge as a new and novel domain for vigilance research. However, unlike classic …
Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs
The proliferation of cyber threats necessitates robust security measures to safeguard critical
assets and data in today's evolving digital landscape. Small and Medium Enterprises …
assets and data in today's evolving digital landscape. Small and Medium Enterprises …
Application of graph domination to defend medical information networks against cyber threats
D Angel - Journal of Ambient Intelligence and Humanized …, 2022 - Springer
The principal and supreme concern in medical information systems is the issue of safe
guarding the electronic health records of patients. Defending a health care industry's …
guarding the electronic health records of patients. Defending a health care industry's …
[PDF][PDF] A Survey on Network Security Monitoring: Tools and Functionalities
Recently, cybersecurity breaches have become more common, with varying levels of impact
ranging from simple to major losses of financial resources or data. The network …
ranging from simple to major losses of financial resources or data. The network …
Detection and Prevention System on Computer Network to Handle Distributed Denial-Of-Service (Ddos) Attack in Realtime and Multi-Agent
This research builds a realtime and multi-agent system to handle Distributed Denial of
Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security …
Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security …
User behaviour based insider threat detection in critical infrastructures
M Singh, BM Mehtre… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
Cyber security is an important concern in critical infrastructures such as banking and
financial organizations, where a number of malicious insiders are involved. These insiders …
financial organizations, where a number of malicious insiders are involved. These insiders …
Protection of medical information systems against cyber attacks: a graph theoretical approach
D Angel - Wireless Personal Communications, 2022 - Springer
Securing electronic health records of patients is the paramount concern in medical
information systems which faces unique set of challenges. Safeguarding a health care's …
information systems which faces unique set of challenges. Safeguarding a health care's …
Security enhancement in mobile ad-hoc network using novel data integrity based hash protection process
S Kumar - Wireless Personal Communications, 2022 - Springer
Abstract Nowadays, Mobile Ad hoc Networks (MANET) are utilized in numerous applications
like disaster management, environmental monitoring, tactical operations, and so on. Usually …
like disaster management, environmental monitoring, tactical operations, and so on. Usually …