A Survey of Internet of Things (IoT) Forensics Frameworks and Challenges
F Abdel-Fattah, S Fayyad, AM Heyari… - 2023 International …, 2023 - ieeexplore.ieee.org
The Internet of Things has led to the deployment of billions of interconnected devices in
critical infrastructures such as health, transportation, environmental control, and home …
critical infrastructures such as health, transportation, environmental control, and home …
Machine Learning and Data Mining in Cybersecurty
F Abdel-Fattah, F AlTamimi… - 2021 International …, 2021 - ieeexplore.ieee.org
A wireless technology Mobile Ad hoc Network (MANET) that connects a group of mobile
devices such as phones, laptops, and tablets suffers from critical security problems, so the …
devices such as phones, laptops, and tablets suffers from critical security problems, so the …
Light fidelity to transfer secure data using advanced encryption standard algorithm
Symmetric (secret) key encryption algorithms are formally used one key for encryption and
decryption processes. One of the advantages of symmetric encryption is that it provides …
decryption processes. One of the advantages of symmetric encryption is that it provides …
The design of an intrusion detection system in MANET using the IGWO-ANN classification algorithm
R Venketesh, K Sasikala - International Journal of …, 2024 - inderscienceonline.com
Presently, attacks on the internet are maximised with the internet's enhancement. Intrusion
detection system (IDS) is one of the compassionate layers relevant to information protection …
detection system (IDS) is one of the compassionate layers relevant to information protection …
[PDF][PDF] Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts
TM Ahmed - CMC-COMPUTERS MATERIALS & CONTINUA, 2022 - cdn.techscience.cn
Mobile Agent has many benefits over traditional distributed systems such as reducing
latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security …
latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security …
SCADA Authentication Identification Over The Next Generation CyberNet
SCADA (supervisory control and data acquisition) system is an advanced control system
used in industrial and service sectors such as oil and gas, water treatment, nuclear energy …
used in industrial and service sectors such as oil and gas, water treatment, nuclear energy …
[PDF][PDF] ENHANCED SLOW-START (ESS): IMPROVING BANDWIDTH UTILIZATION BY ESTIMATING BANDWIDTH DELAY PRODUCT
Z Wang, H Ni, X Zhu, X Wang - ijicic.org
In large bandwidth delay product (BDP) networks, standard slow-start algorithm has
exponentially increasing congestion window, but is still increasingly difficult to meet the …
exponentially increasing congestion window, but is still increasingly difficult to meet the …