Results 11 to 20 of about 1,392 (240)
Towards Mitigating Jellyfish Attacks Based on Honesty Metrics in V2X Autonomous Networks
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of
Messaoud Benguenane +3 more
doaj +1 more source
Delay tolerant networks (DTNs) are a special type of intermittently connected networks (ICN) featured by variable delay, frequent disruption, asymmetric data rates, and high-error rates. The DTNs have been primarily developed for interplanetary networks (
Waqar Khalid +5 more
doaj +1 more source
A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning
Website fingerprinting attacks attempt to apply deep learning technology to identify websites corresponding to encrypted traffic data. Unfortunately, to the best of our knowledge, once the total number of encrypted traffic data becomes insufficient, the ...
Tianyao Pan, Zejia Tang, Dawei Xu
doaj +1 more source
Dissecting Denial of Service (DoS) Syn Flood Attack Dynamics and Impacts in Vehicular Communication Systems [PDF]
In the rapidly evolving landscape of vehicular networks, the resilience of vehicular communication systems against Denial of Service (DoS) attacks is critical.
Zamrai Muhammad Arif Hakimi +2 more
doaj +1 more source
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES [PDF]
In wireless communication, Mobile Ad Hoc Network (MANET) consists of a number of mobile nodes which are communicated with each other without any base station.
K. Shankar, Mohamed Elhoseny
doaj +3 more sources
Of the range of wireless communication technologies, wireless sensor networks (WSN) will be one of the most appropriate technologies for the Microgrid and Grid-enabled Vehicles in the Smartgrid.
Jongbin Ko +3 more
doaj +1 more source
Connect attack in IoT-WSN detect through cyclic analysis based on forward and backward elimination [PDF]
IoT-wireless sensor networks (WSN) have extensive applications in diverse fields such as battlegrounds, commercial sectors, habitat monitoring, buildings, smart homes, and traffic surveillance.
Tamil Selvi S., Visalakshi P.
doaj +2 more sources
DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM
In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop
Ahmad Sanmorino, Setiadi Yazid
doaj +1 more source
Joint Security and QoS Provisioning in Train-Centric CBTC Systems Under Sybil Attacks
The security and Quality-of-Service (QoS) provisioning are two critical themes in urban rail communication-based train control (CBTC) data communication systems, which can directly affect the train's safe operation.
Xiaoxuan Wang +3 more
doaj +1 more source
EAODV: A*-BASED ENHANCEMENT AD-HOC ON DEMAND VECTOR PROTOCOL TO PREVENT BLACK HOLE ATTACKS
Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the ...
Khalil I Ghathwan +2 more
doaj +1 more source

