Cloud-based zero trust access control policy: an approach to support work-from-home driven by COVID-19 pandemic

S Mandal, DA Khan, S Jain - new generation computing, 2021 - Springer
The ubiquitous cloud computing services provide a new paradigm to the work-from-home
environment adopted by the enterprise in the unprecedented crisis of the COVID-19 …

RETRACTED ARTICLE: Learning-based approach to underwater image dehazing using CycleGAN

SR Maniyath, K Vijayakumar, L Singh… - Arabian Journal of …, 2021 - Springer
In this paper, we have proposed a novel deep learning-based underwater image dehazing
method. The images taken under water are affected by light transportation properties like …

Role of authentication factors in Fin-tech mobile transaction security

HU Khan, M Sohail, S Nazir, T Hussain, B Shah, F Ali - Journal of Big Data, 2023 - Springer
Fin-Tech is the merging of finance and technology, to be considered a key term for
technology-based financial operations and money transactions as far as Fin-Tech is …

Hybrid-AI-Based iBeacon Indoor Positioning Cybersecurity: Attacks and Defenses

CJ Huang, CJ Chi, WT Hung - Sensors, 2023 - mdpi.com
iBeacon systems have been increasingly established in public areas to assist users in terms
of indoor location navigation and positioning. People receive the services through the …

Provably curb man-in-the-middle attack-based ARP spoofing in a local network

HI Nasser, MA Hussain - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
Even today, internet users' data security remains a significant concern. One problem is ARP
poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the …

Detection methods for software defined networking intrusions (SDN)

S Prathibha, J Bino, MT Ahammed… - … on Advances in …, 2022 - ieeexplore.ieee.org
It is possible to govern and manage traffic robustly while guaranteeing as a result of which is
secured from any threats in line with client requirements in a Software Defined Network …

A Novel Approach for Predicting wide range of traffic congestion using deep learning Technique

ANG Jeevan, K Keerthika, SR Terli… - … and Smart Electrical …, 2022 - ieeexplore.ieee.org
Identifying traffic bottlenecks and devising solutions to the problem requires researchers and
practitioners in transportation to understand how congestion in one place impacts the rest of …

Traffic congestion control synchronizing and rerouting using LoRa

DM Kumar, R Arthi, C Aravindhan, AA Roch… - Microprocessors and …, 2021 - Elsevier
Recent growth of Automobile users in big cities leads to traffic congestion. Traffic congestion
leads to more waiting time for the vehicle users to reach destination. To avoid this road …

Automated WiFi incident detection attack tool on 802.11 networks

D Koutras, P Dimitrellos… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
In this paper we propose a methodology for intrusion detection of attacks originating from
WiFi networks, along with WiFi-NID, a WiFi Network Intrusion Detection tool, developed to …

Towards a secure software defined network with adaptive mitigation of dDoS attacks by machine learning approaches

E Fenil, PM Kumar - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
DDoS attacks produce a lot of traffic on the network. DDoS attacks may be fought in a novel
method thanks to the rise of Software Defined Networking (SDN). DDoS detection and data …