Results 11 to 20 of about 40,714 (194)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis

open access: yesApplied Sciences, 2023
Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic features that allow network operators to monitor their networks and efficiently manage them. However,
Mohammad Adnan Aladaileh   +6 more
doaj   +1 more source

Towards Secure, Flexible and Efficient Role Based Hospital’s Cloud Management System: Case Study [PDF]

open access: yesEAI Endorsed Transactions on Pervasive Health and Technology, 2020
INTRODUCTION: Many organizations of health care have recognized that quality of service can be improved bymaintaining e-records of patient’s reports, medical histories, surgeries recordings, etc.
Shilpi Harnal, R.K. Chauhan
doaj   +1 more source

Geometric realization of electronic elections based on threshold secret sharing

open access: yesAdvanced Engineering Research, 2018
Introduction. One of the tasks arising in cryptography is to ensure a safe and fair conduct of e-voting. This paper details the algorithm of electronic elections particularly that part which deals with the cryptographic security.
A. V. Mazurenko, V. A. Stukopin
doaj   +1 more source

Accelerated preprocessing in task of searching substrings in a string

open access: yesAdvanced Engineering Research, 2019
Introduction. A rapid development of the systems such as Yandex, Google, etc., has predetermined the relevance of the task of searching substrings in a string, and approaches to its solution are actively investigated. This task is used to create database
A. V. Mazurenko, N. V. Boldyrikhin
doaj   +1 more source

DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation [PDF]

open access: yes, 2018
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable ...
De Donno, Michele   +3 more
core   +4 more sources

AntibIoTic: Protecting IoT Devices Against DDoS Attacks [PDF]

open access: yes, 2017
The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack.
De Donno, Michele   +3 more
core   +2 more sources

A Low-Cost Distributed Denial-of-Service Attack Architecture

open access: yesIEEE Access, 2020
With the advent of Internet-of-Things (IoT) age, IoT-based distributed denial-of-service (DDoS) attacks have become the mainstream of DDoS attacks. This paper is devoted to exploring the possibility of launching an IoT-based DDoS attack at an extremely ...
Kaifan Huang   +4 more
doaj   +1 more source

On Implementation of Efficient Inline DDoS Detector Based on AATAC Algorithm [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Distributed Denial of Service (DDoS) attacks constitute a major threat in the current Internet. These cyber-attacks aim to flood the target system with tailored malicious network traffic overwhelming its service capacity and consequently severely ...
Piotr Wiśniewski   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy