A survey of intrusion detection systems in wireless sensor networks

O Can, OK Sahingoz - 2015 6th international conference on …, 2015 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is a large scale network with from dozens to thousands tiny
devices. Using fields of WSNs (military, health, smart home eg) has a large-scale and its …

Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses

AA Elkhail, RUD Refat, R Habre, A Hafeez… - IEEE …, 2021 - ieeexplore.ieee.org
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …

Classification and analysis of users review using different classification techniques in intelligent e-learning system

A Khamparia, SK Singh… - … Journal of Intelligent …, 2020 - inderscienceonline.com
The internet comprised of a large number of data in the form of text, images, stickers, etc.
which is also called as reviews or feedbacks created by users to share their expressions or …

Contrastive analysis of bubble & merge sort proposing hybrid approach

SM Cheema, N Sarwar, F Yousaf - 2016 Sixth International …, 2016 - ieeexplore.ieee.org
A sorting algorithm is one that puts elements of a list in a certain order. It makes easy
searching and locating the information. The most-used orders are numerical order and …

[PDF][PDF] Survey on fog computing mitigating data theft attacks in cloud

VG Mandlekar, V Mahale, SS Sancheti… - Int. J. Innov. Res …, 2014 - academia.edu
Cloud computing now-a-days forms a very important unit in the online world, by modifying
how the computers and Internet were used few years back. Cloud computing provides the …

An intrusion detection system based on neural network

O Can, OK Sahingoz - 2015 23nd Signal Processing and …, 2015 - ieeexplore.ieee.org
In current time, cyber wars are added in military operation areas. Some measures reduce
amount of attacks but these measures can't block cyber attacks completely so it is important …

Empirical study on anti-virus architecture for container platforms

SH Han, HK Lee, GY Gim, SJ Kim - IEEE Access, 2020 - ieeexplore.ieee.org
Container platforms provide many functions for diverse applications and are used to build
and operate various information services. They have been extended not only to Linux and …

Performance analysis of massive MIMO for 5G wireless communication systems

MS Islam, M Kamruzzaman, T Jessy… - 2016 International …, 2016 - ieeexplore.ieee.org
In the present age, wireless communication system has achieved a huge achievement in
both efficiency and cost effectiveness. High data rate is no more a dream in present situation …

A symmetric key block cipher to provide confidentiality in wireless sensor networks

B Banerjee, JT Patel - Infocomp journal of computer science, 2016 - infocomp.dcc.ufla.br
The sensors of wireless sensor networks communicate by sending and receiving packets
among one another. It is important to provide security in wireless sensor networks so that …

An enhanced hybrid approach for reducing downtime, cost and power consumption of live VM migration

T Jaswal, K Kaur - Proceedings of the International Conference on …, 2016 - dl.acm.org
The computational work load has been diverted from humans to machines as it has reached
to a limit that cannot be handled by humans. Same is the case with the machines. Nowadays …