Accurate detection of network anomalies within SNMP-MIB data set using deep learning
G Al-Naymat, H Hussain… - International …, 2021 - inderscienceonline.com
An efficient algorithm for supporting the Intrusion Detection System is required for identifying
unauthorised access that attempts to collapse a computer network's features. Machine …
unauthorised access that attempts to collapse a computer network's features. Machine …
Detection and mitigation of attacks in SDN-based IoT network using SVM
S Mishra - International Journal of Computer Applications in …, 2021 - inderscienceonline.com
Adapting Software Defined Networking (SDN) raises many challenges including scalability
and security on the Internet of Things (IoT) network. Growing network size increases …
and security on the Internet of Things (IoT) network. Growing network size increases …
Analysis of web browser for digital forensics investigation
BH AlOwaimer, S Mishra - International Journal of …, 2021 - inderscienceonline.com
In today's digitalised world, a lot of information is getting online; the size of online data is
getting huge day by day, and thus here emerges the field of data science. An internal …
getting huge day by day, and thus here emerges the field of data science. An internal …
An identity-based integrity verification scheme for cloud storage in 5G environment
Z Wu, J Zhang, Z Cai - International Journal of Computer …, 2020 - inderscienceonline.com
In order to solve the security problems such as leakage, tampering of sensitive data in cloud
storage, the previous schemes usually sacrificed communication efficiency for higher …
storage, the previous schemes usually sacrificed communication efficiency for higher …
Finite state transducer based light-weight cryptosystem for data confidentiality in cloud computing
BB Kodada, DA D'Mello - International Journal of Grid and …, 2022 - inderscienceonline.com
Cloud computing is derived from parallel, cluster, grid and distributed computing and is
becoming an advanced and growing technology. With the rapid growth of Internet …
becoming an advanced and growing technology. With the rapid growth of Internet …
[PDF][PDF] Tesis de Maestría
JA Franco - 2015 - academia.edu
Hoy día un gran número de empresas, incluyendo emprendimientos y PYMES, usan
tecnología de computación y almacenamiento en la nube. Esta tecnología facilita tener …
tecnología de computación y almacenamiento en la nube. Esta tecnología facilita tener …
Protección de datos compartidos en entornos de nube
GA Cubillos Franco - 2020 - repositorio.uniandes.edu.co
Hoy día un gran número de empresas, incluyendo emprendimientos y PYMES, usan
tecnología de computación y almacenamiento en la nube. Esta tecnología facilita tener …
tecnología de computación y almacenamiento en la nube. Esta tecnología facilita tener …
[PDF][PDF] Research on Safety Monitoring Index System of Government Data Disclosure
Z Jiaxin, J Ming, H Jingcen - INNOVATION AND MANAGEMENT, 2020 - researchgate.net
In recent years, the Chinese government has paid more and more attention to the disclosure
of government data and has achieved good results. However, due to the wide range of …
of government data and has achieved good results. However, due to the wide range of …