Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy
Network intrusion is a huge harmful activity to the privacy of the data sharing network. The
activity will result in a cyber-attack, which causes damage to the system as well as the user's …
activity will result in a cyber-attack, which causes damage to the system as well as the user's …
A framework to build a Big Data ecosystem oriented to the collaborative networked organization
JA Hernandez-Almazan, R Chalmeta… - Applied Sciences, 2022 - mdpi.com
A Collaborative Networked Organization (CNO) is a set of entities that operate in
heterogeneous contexts and aim to collaborate to take advantage of a business opportunity …
heterogeneous contexts and aim to collaborate to take advantage of a business opportunity …
HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach
The proliferation of Internet of Things (IoT) devices has revolutionized various domains, but it
has also brought forth numerous security challenges. One of the most concerning threats is …
has also brought forth numerous security challenges. One of the most concerning threats is …
UGAVs-MDVR: a cluster-based multicast routing protocol for unmanned ground and aerial vehicles communication in VANET
Unmanned ground vehicles (UGVs) are becoming the foremost part of rescue teams for
protecting human lives from severe disasters and reducing human casualties by informing …
protecting human lives from severe disasters and reducing human casualties by informing …
Review in authentication for mobile ad hoc network
H Khalfaoui, A Farchane, S Safi - Advances on Smart and Soft Computing …, 2022 - Springer
As far back as the 90s, Mobile Ad hoc Networks have successfully gained the scientific
community interest because of the ease of their deployment and administration in many …
community interest because of the ease of their deployment and administration in many …
An RSSI-based Sybil attack detection system with continuous authentication using a novel lightweight multimodal biometrics
NV Brindha, VS Meenakshi - International Journal of Intelligent …, 2020 - emerald.com
Purpose Any node in a mobile ad hoc network (MANET) can act as a host or router at any
time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is …
time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is …
A Review of Biometric based Authentication for MANET
N Kaur - 2018 Fifth International Conference on Parallel …, 2018 - ieeexplore.ieee.org
Security and ease of access have become the most basic demand of any service provider
community whether it is a social media, a communication network or a wireless network …
community whether it is a social media, a communication network or a wireless network …
[PDF][PDF] Review in Authentication for Mobile Ad hoc Network
K Hafida, F Abderrazak, S Said - researchgate.net
As far back as the 90s, mobile Ad hoc networks have successfully gained the scientific
community interest because of the ease of their deployment and administration in many …
community interest because of the ease of their deployment and administration in many …
[PDF][PDF] ENHANCED INTERSECTION-BASED OPTIMAL ROUTE SELECTION IN MANET WITH DOWNSIZED PACKET LOSS
A Sathiyaraj, KS Babu - researchgate.net
In MANET, nodes within their coverage area can communicate directly and nodes that are in
out of coverage can communicate through intermediate nodes. Reactive routing protocol …
out of coverage can communicate through intermediate nodes. Reactive routing protocol …
[PDF][PDF] GIẢI PHÁP NÂNG CAO AN TOÀN CHO GIAO THỨC ĐỊNH TUYẾN TRONG MẠNG MANET
VÀCNV NAM - gust.edu.vn
Tôi xin cam đoan luận án:" Giải pháp nâng cao an toàn cho giao thức định tuyến trong mạng
MANET" là công trình nghiên cứu của chính mình dưới sự hướng dẫn khoa học của tập thể …
MANET" là công trình nghiên cứu của chính mình dưới sự hướng dẫn khoa học của tập thể …