A novel wolf based trust accumulation approach for preventing the malicious activities in mobile ad hoc network

R Vatambeti - Wireless Personal Communications, 2020 - Springer
… Moreover, the predicted attacked nodes are replaced to the … gadget has the reception
apparatus for their correspondence. … approach to predict the malicious activities and to prevent it, …

[图书][B] Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats

A Mukherjee - 2020 - books.google.com
… us to build a resilient network security apparatus, secure existing network infrastructure, and
… critical network segments, thus preventing widespread impact in the event of a cyber attack. …

[HTML][HTML] A comprehensive study on the role of machine learning in 5G security: challenges, technologies, and solutions

HN Fakhouri, S Alawadi, FM Awaysheh, IB Hani… - Electronics, 2023 - mdpi.com
… fortifying predictive security measures, and strengthening intrusion … A few of the anticipated
attack methods and techniques are … is shared among multiple devices or network nodes. This …

Proposal of an innovative method to implement, measure, and validate the security level of a system based on system modelling.

G El Hajal - 2022 - theses.hal.science
… purposes such as predictive maintenance, fraud … device level, we have developed software
for managing cyber threats which includes methods and tools for risk assessment and attack

A FUSED MACHINE LEARNING INTRUSION DETECTION MODEL IN MANETS.

KG MINDO - 2019 - ir.kabarak.ac.ke
… on a network of Smart wearable devices and Raspberry Pi. … cases of DDOS and blackhole
attacks on MANETs by using … that prevents flood attacks christened FAPRP Flood Attack

Cyber ML-Based Cyberattack Prediction Framework in Healthcare Cyber-Physical Systems

PS Kumar, M Karthiga… - … Intelligence in Robotics …, 2023 - taylorfrancis.com
… is a technique that is utilized to safeguard the connected devices in the internet from attacks.
… Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using …

[HTML][HTML] A review of cyber threats and defence approaches in emergency management

G Loukas, D Gan, T Vuong - Future Internet, 2013 - mdpi.com
… a cyber attack can even affect the operation of physical devices, … network, as insiders or
following a successful masquerading attack, a technique detailed in [25] can be used to prevent

Prevention of cyberattacks in WSN and packet drop by CI framework and information processing protocol using AI and Big Data

S Shreyanth - … of Computer Networks and Wireless Communications  …, 2018 - arxiv.org
attack patterns and the prediction of potential threats. Big data analytics … This paper presents
a novel framework for predicting … security mechanisms for devices with limited resources [7]. …

Application-level autonomic hardware to predict and preempt software attacks on industrial control systems

LW Lerner, ZR Franklin, WT Baumann… - … and Networks, 2014 - ieeexplore.ieee.org
… The Quanser ROTPEN-SE apparatus allows testing our approach on an increasingly
complex set of systems, from simple rotary motion control, to an inherently stable gantry crane …

[图书][B] Handbook of information and communication security

P Stavroulakis, M Stamp - 2010 - books.google.com
… Te Y2K scare was the fear that c-puter networks and the … Te terrorist attacks of 11 September
2001 raised security … of reliable information via secure networks and the other being the …