[BOK][B] Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach

R Rani, S Kumar, U Dohare - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
In sensor-enabled Internet of Things (IoT), nodes are deployed in an open and remote
environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes …

Improved grey relational analysis-based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs

S Jagatheswari, P Ramalingam… - International Journal of …, 2022 - Springer
Mobile ad hoc network (MANET) is a self-configuring and infrastructure less network in
which the nodes are considered to move autonomously through the interfaces of wireless …

[HTML][HTML] A novel anomaly behavior detection scheme for mobile ad hoc networks

N Chugh, GS Tomar, RS Bhadoria, N Saxena - Electronics, 2021 - mdpi.com
To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms
of confidentially, authentication, integrity, authorization, key management, and abnormal …

Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol

AM Shabut, K Dahal, MS Kaiser… - 2017 IEEE Region 10 …, 2017 - ieeexplore.ieee.org
Tactical Mobile Ad-hoc NETworks (T-MANETs) are mainly used in self-configuring automatic
vehicles and robots (also called nodes) for the rescue and military operations. A high …

Adaptive trust-aware decentralized information flow control

C Skandylas, N Khakpour… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Modern software systems are decentralized, distributed, and dynamic, and consequently,
require decentralized mechanisms to enforce security. In this paper, we propose an adaptive …

AT-DIFC+: Toward Adaptive and Trust-Aware Decentralized Information Flow Control

C Skandylas, N Khakpour, J Andersson - ACM Transactions on …, 2021 - dl.acm.org
Modern software systems and their corresponding architectures are increasingly
decentralized, distributed, and dynamic. As a consequence, decentralized mechanisms are …

Summary and Future Directions of the Book

S Sagar, A Mahmood, QZ Sheng - … Social IoT Sensors and Networks: A …, 2024 - Springer
and Future Directions of the Book | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart 1.Home …

Self-adaptive trust-aware decentralized information flow control, extended version

C Skandylas, N Khakpour, J Andersson - 2020 - diva-portal.org
Modern software systems and their corresponding architectures are decentralized,
distributed, and dynamic. As a consequence, decentralized mechanisms are also required …

Mitigate black hole attack using bee optimised weighted trust with AODV in MANET

V Keerthika, N Malarvizhi - International Journal of …, 2019 - inderscienceonline.com
Mobile ad hoc network (MANET) is a decentralised network that can be used without any
fixed setup or infrastructure and offers unlimited opportunities in all fields. Both the …