Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system
Intrusion detection system has become the fundamental part for the network security and
essential for network security because of the expansion of attacks which causes many …
essential for network security because of the expansion of attacks which causes many …
A new secure transmission scheme between senders and receivers using HVCHC without any loss
S Almutairi, M Aborokbah - EURASIP Journal on Wireless …, 2019 - Springer
This paper presents a novel secure medical image transmission scheme using hybrid visual
cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale …
cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale …
Certain Investigations on IoT system for COVID-19
S Jaafari, A Alhasani, SM Almutairi - … Conference on Computing …, 2020 - ieeexplore.ieee.org
Corona Viruses are a group of viruses that can cause diseases such as colds, severe acute
respiratory syndrome (SARS) and the Middle East Respiratory Syndrome (MERS). A new …
respiratory syndrome (SARS) and the Middle East Respiratory Syndrome (MERS). A new …
Automotive domain controller
D Wang, S Ganesan - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Today, every electronic control system in the car, such as Instrument Cluster, Infotainment,
Anti-lock braking system, Engine Management System, Transmission Control Unit, and Body …
Anti-lock braking system, Engine Management System, Transmission Control Unit, and Body …
IoT based empowerment by smart health monitoring, smart education and smart jobs
S Eeshwaroju, P Jakkula… - … conference on computing …, 2020 - ieeexplore.ieee.org
This paper describes the idea and overview of enhancing the empowerment using internet
of Things (IoT) via three main pillars of the society ie, health, education and wealth …
of Things (IoT) via three main pillars of the society ie, health, education and wealth …
A survey on cloud security issues and solution
S Alatawi, A Alhasani, S Alfaidi… - … on Computing and …, 2020 - ieeexplore.ieee.org
Cloud computing is modem system provides software tools and resources by internet as
user demand. in the traditional way the user must download files to use it but now in cloud …
user demand. in the traditional way the user must download files to use it but now in cloud …
DRCNN-IDS approach for intelligent intrusion detection system
In recent times, deep learning technique turns to be an interesting topic, which is extensively
utilized to construct an Intrusion Detection System (IDS) for identifying and classifying web …
utilized to construct an Intrusion Detection System (IDS) for identifying and classifying web …
Intelligent ambulance with automatic traffic control
The existing predictable traffic signal timing methods does not result in an effective control of
congestion. An intelligent traffic control system for congestion control, gives way for the …
congestion. An intelligent traffic control system for congestion control, gives way for the …
The Secret image hiding schemes using Steganography-Survey
H Alatawi, C Narmatha - 2020 International conference on …, 2020 - ieeexplore.ieee.org
Steganography is a clever technique for concealing information within a digital cover
medium, and without causing any significant distortion or modification in this medium. There …
medium, and without causing any significant distortion or modification in this medium. There …
A grayscale image hiding encode scheme for secure transmission
C Narmatha, P Manimegalai… - Current Signal …, 2019 - ingentaconnect.com
Background: To transmit the secret data are in a secure manner or to prevent the
intruder/third party activities while transmitting secret data's through the public networks are …
intruder/third party activities while transmitting secret data's through the public networks are …