Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm
The rapid evolution of network traffic created various problems in detecting Distributed
Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) …
Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) …
An energy efficient encryption technique for the Internet of Things sensor nodes
Securing data at the back end in Internet of Things (IoT) applications, such as a cloud server,
is easy due to the ample computational resources at that stage. However, securing the data …
is easy due to the ample computational resources at that stage. However, securing the data …
Optimized quantum circuit implementation of SATURNIN for Grover's algorithm
In 2019, SATURNIN a light-weighted block cipher was proposed for post-quantum security.
In this research, we try to examine the security strength of SATURNIN by implementing its …
In this research, we try to examine the security strength of SATURNIN by implementing its …
Improving dependability with low power fault detection model for skinny-hash
The increasing popularity and prevalence of Internet of Things (IoT) applications have led to
the widespread use of IoT devices. These devices gather information from their environment …
the widespread use of IoT devices. These devices gather information from their environment …
Evaluation of a 3-DOF helicopter dynamic control model using FOPID controller-based three optimization algorithms
This paper discusses the performance comparison of three advanced AI methodologies,
namely: Harris Hawks Optimization (HHO), Hybrid Sperm Swarm Optimization Gravitational …
namely: Harris Hawks Optimization (HHO), Hybrid Sperm Swarm Optimization Gravitational …
Novel hardware architectures of improved-LEA lightweight cipher for IoT applications
Abstract The Internet of Things (IoTs), smart cards, and other ubiquitous computing devices
have grown exponentially since last decade. These devices demand new security and …
have grown exponentially since last decade. These devices demand new security and …
Audio verification in forensic investigation using light deep neural network
Recently people have difficulties distinguishing real speech from computer-generated
speech so that the synthetic voice is getting closer to a natural-sounding voice, due to the …
speech so that the synthetic voice is getting closer to a natural-sounding voice, due to the …
Quantum resource estimation of PRINCE and Midori Block Ciphers
With the continuous advancement of quantum technologies, the estimation of quantum
resources necessary for quantum tasks becomes extremely important for optimization …
resources necessary for quantum tasks becomes extremely important for optimization …
ZeroMedChain: Layer 2 Security and Zero-knowledge Proof Integration for Decentralized Identity and Access Management in Healthcare
With the rise of healthcare digitization, it has become a critical priority to safeguard patient
privacy and ensure data security. Conventional methods of data access control mechanisms …
privacy and ensure data security. Conventional methods of data access control mechanisms …