Cloud-based zero trust access control policy: an approach to support work-from-home driven by COVID-19 pandemic
The ubiquitous cloud computing services provide a new paradigm to the work-from-home
environment adopted by the enterprise in the unprecedented crisis of the COVID-19 …
environment adopted by the enterprise in the unprecedented crisis of the COVID-19 …
RETRACTED ARTICLE: Learning-based approach to underwater image dehazing using CycleGAN
SR Maniyath, K Vijayakumar, L Singh… - Arabian Journal of …, 2021 - Springer
In this paper, we have proposed a novel deep learning-based underwater image dehazing
method. The images taken under water are affected by light transportation properties like …
method. The images taken under water are affected by light transportation properties like …
Role of authentication factors in Fin-tech mobile transaction security
Fin-Tech is the merging of finance and technology, to be considered a key term for
technology-based financial operations and money transactions as far as Fin-Tech is …
technology-based financial operations and money transactions as far as Fin-Tech is …
Hybrid-AI-Based iBeacon Indoor Positioning Cybersecurity: Attacks and Defenses
CJ Huang, CJ Chi, WT Hung - Sensors, 2023 - mdpi.com
iBeacon systems have been increasingly established in public areas to assist users in terms
of indoor location navigation and positioning. People receive the services through the …
of indoor location navigation and positioning. People receive the services through the …
Provably curb man-in-the-middle attack-based ARP spoofing in a local network
HI Nasser, MA Hussain - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
Even today, internet users' data security remains a significant concern. One problem is ARP
poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the …
poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the …
Detection methods for software defined networking intrusions (SDN)
It is possible to govern and manage traffic robustly while guaranteeing as a result of which is
secured from any threats in line with client requirements in a Software Defined Network …
secured from any threats in line with client requirements in a Software Defined Network …
A Novel Approach for Predicting wide range of traffic congestion using deep learning Technique
ANG Jeevan, K Keerthika, SR Terli… - … and Smart Electrical …, 2022 - ieeexplore.ieee.org
Identifying traffic bottlenecks and devising solutions to the problem requires researchers and
practitioners in transportation to understand how congestion in one place impacts the rest of …
practitioners in transportation to understand how congestion in one place impacts the rest of …
Traffic congestion control synchronizing and rerouting using LoRa
Recent growth of Automobile users in big cities leads to traffic congestion. Traffic congestion
leads to more waiting time for the vehicle users to reach destination. To avoid this road …
leads to more waiting time for the vehicle users to reach destination. To avoid this road …
Automated WiFi incident detection attack tool on 802.11 networks
D Koutras, P Dimitrellos… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
In this paper we propose a methodology for intrusion detection of attacks originating from
WiFi networks, along with WiFi-NID, a WiFi Network Intrusion Detection tool, developed to …
WiFi networks, along with WiFi-NID, a WiFi Network Intrusion Detection tool, developed to …
Towards a secure software defined network with adaptive mitigation of dDoS attacks by machine learning approaches
DDoS attacks produce a lot of traffic on the network. DDoS attacks may be fought in a novel
method thanks to the rise of Software Defined Networking (SDN). DDoS detection and data …
method thanks to the rise of Software Defined Networking (SDN). DDoS detection and data …