Detection of DDOS attack using IDS mechanism: a review

A Agarwal, R Singh, M Khari - 2022 1st International …, 2022 - ieeexplore.ieee.org
There are many problems with the Internet right now, but one of them is called “Distributed
Denial of Service attacks.” Various ways of protecting against this type of attack, which has …

Detection of DDOS attack using deep learning model in cloud storage application

A Agarwal, M Khari, R Singh - Wireless Personal Communications, 2022 - Springer
In recent years, distributed denial of service (DDoS) attacks pose a serious threat to network
security. How to detect and defend against DDoS attacks is currently a hot topic in both …

Smart contracts with blockchain in the public sector

JAT Casallas, JMC Lovelle, JIR Molano - IJIMAI, 2020 - dialnet.unirioja.es
The appearance of so-called block chains or Blockchain with the promise of transforming
trust and the way value is exchanged, joins the expansion of the technological capabilities of …

Understanding the cyber-physical system in international stadiums for security in the network from cyber-attacks and adversaries using AI

B Wan, C Xu, RP Mahapatra, P Selvaraj - Wireless Personal …, 2022 - Springer
Sports stadiums have a substantial influence on the environmental, urban, and social
context. Information and communication technology applications in the international sports …

Secure and efficient transmission of data based on Caesar Cipher Algorithm for Sybil attack in IoT

ASS Thuluva, MS Somanathan, R Somula… - EURASIP Journal on …, 2021 - Springer
Abstract The Internet of Things (IoT) is an emerging concept in the field of information
technology. IoT can integrate any real-time entity with another, using sensing, computing …

Network security defence system based on artificial intelligence and big data technology

L Xie, F Hang, W Guo, Y Lv, W Ou… - … journal of high …, 2021 - inderscienceonline.com
Communication network security is a defence against unwanted system modifications to
access files and folders within a computer network. The increasing overlap between the …

Defense in Depth: Multilayer of security

R Alsaqour, A Majrashi, M Alreedi… - International …, 2021 - search.proquest.com
Many types and methodologies of attacks have been developed to target the victims in
different ways affecting their resources and assets. This paper reviews the defense in depth …

Text embedding in image using an optimisation-based key generation method

SA Shawkat, N Tagougui… - International Journal of …, 2023 - inderscienceonline.com
Data hiding capacity and image quality of the cover object are important factors in text
steganography, and data encryption is being widely employed to secure data in order to …

Risk Handling and Vulnerability Assessment in IoT-Enabled Marketing Domain of Digital Business System

S Joghee - Arabian Journal for Science and …, 2021 - research.skylineuniversity.ac.ae
Rapid Internet development and technology contribute to the emergence of digital business
models, product life, utilities, etc. Internet of Things (IoT) also handles e-business and …

A new mail system for secure data transmission in cyber physical systems

D Piedrahita Castillo, FM Regidor… - … Journal of Uncertainty …, 2020 - World Scientific
This paper provides a complete study on email requirements, with special emphasis on its
security aspects and architecture. It explores how current protocols have evolved, the …