Results 11 to 20 of about 61,931 (258)
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel +5 more
wiley +1 more source
White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets
A new kind of malware called Mirai is spreading like wildfire. Mirai is characterized by targeting Internet of Things (IoT) devices. Since IoT devices are increasing explosively, it is not realistic to manage their vulnerability by human-wave tactics ...
Shingo Yamaguchi
doaj +1 more source
Towards Secure, Flexible and Efficient Role Based Hospital’s Cloud Management System: Case Study [PDF]
INTRODUCTION: Many organizations of health care have recognized that quality of service can be improved bymaintaining e-records of patient’s reports, medical histories, surgeries recordings, etc.
Shilpi Harnal, R.K. Chauhan
doaj +1 more source
DDOS Botnets Attacks Detection in Anomaly Traffic: A Comparative Study.
One of the major challenges that faces the acceptance and growth rate of business and governmental sites is a Botnet-based DDoS attack. A flooding DDoS strikes a victim machine by means of sending a vast amount of malicious traffic, causing a significant
Ahmed A. Elsherif, أروى الداعج
doaj +1 more source
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security ...
Tariq Emad Ali +2 more
semanticscholar +1 more source
Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing
Cloud computing is a vast revolution in information technology (IT) that inhibits scalable and virtualized sources to end users with low infrastructure cost and maintenance.
S. Balasubramaniam +6 more
semanticscholar +1 more source
Geometric realization of electronic elections based on threshold secret sharing
Introduction. One of the tasks arising in cryptography is to ensure a safe and fair conduct of e-voting. This paper details the algorithm of electronic elections particularly that part which deals with the cryptographic security.
A. V. Mazurenko, V. A. Stukopin
doaj +1 more source
Accelerated preprocessing in task of searching substrings in a string
Introduction. A rapid development of the systems such as Yandex, Google, etc., has predetermined the relevance of the task of searching substrings in a string, and approaches to its solution are actively investigated. This task is used to create database
A. V. Mazurenko, N. V. Boldyrikhin
doaj +1 more source
DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing ...
Mohammad Taufan Asri Zaen +2 more
doaj +1 more source

