Results 11 to 20 of about 61,931 (258)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets

open access: yesSensors, 2020
A new kind of malware called Mirai is spreading like wildfire. Mirai is characterized by targeting Internet of Things (IoT) devices. Since IoT devices are increasing explosively, it is not realistic to manage their vulnerability by human-wave tactics ...
Shingo Yamaguchi
doaj   +1 more source

Towards Secure, Flexible and Efficient Role Based Hospital’s Cloud Management System: Case Study [PDF]

open access: yesEAI Endorsed Transactions on Pervasive Health and Technology, 2020
INTRODUCTION: Many organizations of health care have recognized that quality of service can be improved bymaintaining e-records of patient’s reports, medical histories, surgeries recordings, etc.
Shilpi Harnal, R.K. Chauhan
doaj   +1 more source

DDOS Botnets Attacks Detection in Anomaly Traffic: A Comparative Study.

open access: yesJournal of Information Security and Cybercrimes Research, 2020
One of the major challenges that faces the acceptance and growth rate of business and governmental sites is a Botnet-based DDoS attack. A flooding DDoS strikes a victim machine by means of sending a vast amount of malicious traffic, causing a significant
Ahmed A. Elsherif, أروى الداعج
doaj   +1 more source

Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

open access: yesApplied Sciences, 2023
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security ...
Tariq Emad Ali   +2 more
semanticscholar   +1 more source

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing

open access: yesInternational Journal of Intelligent Systems, 2023
Cloud computing is a vast revolution in information technology (IT) that inhibits scalable and virtualized sources to end users with low infrastructure cost and maintenance.
S. Balasubramaniam   +6 more
semanticscholar   +1 more source

Geometric realization of electronic elections based on threshold secret sharing

open access: yesAdvanced Engineering Research, 2018
Introduction. One of the tasks arising in cryptography is to ensure a safe and fair conduct of e-voting. This paper details the algorithm of electronic elections particularly that part which deals with the cryptographic security.
A. V. Mazurenko, V. A. Stukopin
doaj   +1 more source

Accelerated preprocessing in task of searching substrings in a string

open access: yesAdvanced Engineering Research, 2019
Introduction. A rapid development of the systems such as Yandex, Google, etc., has predetermined the relevance of the task of searching substrings in a string, and approaches to its solution are actively investigated. This task is used to create database
A. V. Mazurenko, N. V. Boldyrikhin
doaj   +1 more source

DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS

open access: yesJISA (Jurnal Informatika dan Sains), 2021
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing ...
Mohammad Taufan Asri Zaen   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy