An accurate attack detection framework based on exponential polynomial kernel‐centered deep neural networks in the wireless sensor network
B Raveendranadh… - Transactions on emerging …, 2023 - Wiley Online Library
A novel type of wireless network that is rising in popularity with a wide assortment of civilian
along with military applications is called WSN. Owing to several factors like nodes with …
along with military applications is called WSN. Owing to several factors like nodes with …
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
Abstract Wireless Multimedia Sensor Network (WMSN) is a network of interconnected
sensor nodes equipped with multimedia devices capable to retrieve multimedia as well as …
sensor nodes equipped with multimedia devices capable to retrieve multimedia as well as …
[HTML][HTML] Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission
S Anitha, S Saravanan, A Chandrasekar - Measurement: Sensors, 2023 - Elsevier
WSNs are now widely used for information gathering and transmission using WSN. Due to
its low cost and simple communication, this type of network is widely used in many …
its low cost and simple communication, this type of network is widely used in many …
An effective network intrusion detection and classification system for securing WSN using VGG-19 and hybrid deep neural network techniques
In today's world, a Network Intrusion Detection System (NIDS) plays a vital role in order to
secure the Wireless Sensor Network (WSN). However, the traditional NIDS model faced …
secure the Wireless Sensor Network (WSN). However, the traditional NIDS model faced …
Side-channel attacks on mobile and IoT devices for Cyber–Physical systems
The attacks that leverage the side-channels produced by processes running on mobile and
IoT devices are a concrete threat for cyber–physical systems. This special issue is focused …
IoT devices are a concrete threat for cyber–physical systems. This special issue is focused …
[HTML][HTML] Aligning security and energy-efficiency using change detection and partial encryption for wireless camera networks
OA Khashan - Engineering Science and Technology, an International …, 2024 - Elsevier
Wireless camera networks (WCNs) have seen widespread deployment in recent years,
leading to an upsurge in monitoring and surveillance systems aimed at detecting foreign …
leading to an upsurge in monitoring and surveillance systems aimed at detecting foreign …
[HTML][HTML] Distributed Fog computing system for weapon detection and face recognition
H Martinez, FJ Rodriguez-Lozano… - Journal of Network and …, 2024 - Elsevier
Surveillance systems are very important to prevent situations where armed people appear.
To minimize human supervision, there are algorithms based on artificial intelligence that …
To minimize human supervision, there are algorithms based on artificial intelligence that …
Metric Identification Evaluating Security Information: A Systematic Literature Review
Metrics for the evaluation of information security basically contribute to risk reduction within
organizations dealing with the manipulation of information. However, in information security …
organizations dealing with the manipulation of information. However, in information security …
GS3: A lightweight method of Generating data blocks with Shuffling, Scrambling, and Substituting data for constrained IoT devices
F Alcaraz-Velasco, JM Palomares… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The enabling devices and sensors of the Internet of Things (IoT) are characterized by
devices with limited resources, where the computation and the energy consumption should …
devices with limited resources, where the computation and the energy consumption should …
A Security Information Transmission Method Based on DHR for Seafloor Observation Network
F Ying, S Zhao, J Wang - Sensors, 2024 - mdpi.com
A seafloor observation network (SON) consists of a large number of heterogeneous devices
that monitor the deep sea and communicate with onshore data centers. Due to the long …
that monitor the deep sea and communicate with onshore data centers. Due to the long …