A survey of intrusion detection systems in wireless sensor networks
Wireless Sensor Network (WSN) is a large scale network with from dozens to thousands tiny
devices. Using fields of WSNs (military, health, smart home eg) has a large-scale and its …
devices. Using fields of WSNs (military, health, smart home eg) has a large-scale and its …
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …
new developments, modern vehicles are getting increasingly astute and offering growing …
Classification and analysis of users review using different classification techniques in intelligent e-learning system
The internet comprised of a large number of data in the form of text, images, stickers, etc.
which is also called as reviews or feedbacks created by users to share their expressions or …
which is also called as reviews or feedbacks created by users to share their expressions or …
Contrastive analysis of bubble & merge sort proposing hybrid approach
A sorting algorithm is one that puts elements of a list in a certain order. It makes easy
searching and locating the information. The most-used orders are numerical order and …
searching and locating the information. The most-used orders are numerical order and …
[PDF][PDF] Survey on fog computing mitigating data theft attacks in cloud
VG Mandlekar, V Mahale, SS Sancheti… - Int. J. Innov. Res …, 2014 - academia.edu
Cloud computing now-a-days forms a very important unit in the online world, by modifying
how the computers and Internet were used few years back. Cloud computing provides the …
how the computers and Internet were used few years back. Cloud computing provides the …
An intrusion detection system based on neural network
In current time, cyber wars are added in military operation areas. Some measures reduce
amount of attacks but these measures can't block cyber attacks completely so it is important …
amount of attacks but these measures can't block cyber attacks completely so it is important …
Empirical study on anti-virus architecture for container platforms
SH Han, HK Lee, GY Gim, SJ Kim - IEEE Access, 2020 - ieeexplore.ieee.org
Container platforms provide many functions for diverse applications and are used to build
and operate various information services. They have been extended not only to Linux and …
and operate various information services. They have been extended not only to Linux and …
Performance analysis of massive MIMO for 5G wireless communication systems
In the present age, wireless communication system has achieved a huge achievement in
both efficiency and cost effectiveness. High data rate is no more a dream in present situation …
both efficiency and cost effectiveness. High data rate is no more a dream in present situation …
A symmetric key block cipher to provide confidentiality in wireless sensor networks
The sensors of wireless sensor networks communicate by sending and receiving packets
among one another. It is important to provide security in wireless sensor networks so that …
among one another. It is important to provide security in wireless sensor networks so that …
An enhanced hybrid approach for reducing downtime, cost and power consumption of live VM migration
T Jaswal, K Kaur - Proceedings of the International Conference on …, 2016 - dl.acm.org
The computational work load has been diverted from humans to machines as it has reached
to a limit that cannot be handled by humans. Same is the case with the machines. Nowadays …
to a limit that cannot be handled by humans. Same is the case with the machines. Nowadays …