A novel wolf based trust accumulation approach for preventing the malicious activities in mobile ad hoc network
R Vatambeti - Wireless Personal Communications, 2020 - Springer
… Moreover, the predicted attacked nodes are replaced to the … gadget has the reception
apparatus for their correspondence. … approach to predict the malicious activities and to prevent it, …
apparatus for their correspondence. … approach to predict the malicious activities and to prevent it, …
[图书][B] Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats
A Mukherjee - 2020 - books.google.com
… us to build a resilient network security apparatus, secure existing network infrastructure, and
… critical network segments, thus preventing widespread impact in the event of a cyber attack. …
… critical network segments, thus preventing widespread impact in the event of a cyber attack. …
[HTML][HTML] A comprehensive study on the role of machine learning in 5G security: challenges, technologies, and solutions
… fortifying predictive security measures, and strengthening intrusion … A few of the anticipated
attack methods and techniques are … is shared among multiple devices or network nodes. This …
attack methods and techniques are … is shared among multiple devices or network nodes. This …
Proposal of an innovative method to implement, measure, and validate the security level of a system based on system modelling.
G El Hajal - 2022 - theses.hal.science
… purposes such as predictive maintenance, fraud … device level, we have developed software
for managing cyber threats which includes methods and tools for risk assessment and attack …
for managing cyber threats which includes methods and tools for risk assessment and attack …
A FUSED MACHINE LEARNING INTRUSION DETECTION MODEL IN MANETS.
KG MINDO - 2019 - ir.kabarak.ac.ke
… on a network of Smart wearable devices and Raspberry Pi. … cases of DDOS and blackhole
attacks on MANETs by using … that prevents flood attacks christened FAPRP Flood Attack …
attacks on MANETs by using … that prevents flood attacks christened FAPRP Flood Attack …
Cyber ML-Based Cyberattack Prediction Framework in Healthcare Cyber-Physical Systems
PS Kumar, M Karthiga… - … Intelligence in Robotics …, 2023 - taylorfrancis.com
… is a technique that is utilized to safeguard the connected devices in the internet from attacks.
… Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using …
… Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using …
[HTML][HTML] A review of cyber threats and defence approaches in emergency management
… a cyber attack can even affect the operation of physical devices, … network, as insiders or
following a successful masquerading attack, a technique detailed in [25] can be used to prevent …
following a successful masquerading attack, a technique detailed in [25] can be used to prevent …
Prevention of cyberattacks in WSN and packet drop by CI framework and information processing protocol using AI and Big Data
S Shreyanth - … of Computer Networks and Wireless Communications …, 2018 - arxiv.org
… attack patterns and the prediction of potential threats. Big data analytics … This paper presents
a novel framework for predicting … security mechanisms for devices with limited resources [7]. …
a novel framework for predicting … security mechanisms for devices with limited resources [7]. …
Application-level autonomic hardware to predict and preempt software attacks on industrial control systems
LW Lerner, ZR Franklin, WT Baumann… - … and Networks, 2014 - ieeexplore.ieee.org
… The Quanser ROTPEN-SE apparatus allows testing our approach on an increasingly
complex set of systems, from simple rotary motion control, to an inherently stable gantry crane …
complex set of systems, from simple rotary motion control, to an inherently stable gantry crane …
[图书][B] Handbook of information and communication security
P Stavroulakis, M Stamp - 2010 - books.google.com
… Te Y2K scare was the fear that c-puter networks and the … Te terrorist attacks of 11 September
2001 raised security … of reliable information via secure networks and the other being the …
2001 raised security … of reliable information via secure networks and the other being the …