[HTML][HTML] Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications

S Al-Janabi, I Al-Shourbaji, M Shojafar… - Egyptian informatics …, 2017 - Elsevier
Abstract Wireless Body Area Network (WBAN) is a new trend in the technology that provides
remote mechanism to monitor and collect patient's health record data using wearable …

Attack in smartphone Wi-Fi access channel: State of the art, current issues, and challenges

K Sharma, BB Gupta - Next-Generation Networks: Proceedings of CSI …, 2018 - Springer
Today, Smartphone device uses are increasing day-by-day such as email, gaming, Internet
banking, which requires it to always remain connected with Wi-Fi. This makes it vulnerable …

Flawed security of social network of things

R Anand, A Sinha, A Bhardwaj… - Handbook of Research on …, 2018 - igi-global.com
This chapter deals with the security flaws of social network of things. The network of things
(NoT) is a dynamic structure that is basically an interface of real world and virtual world …

Network security: attacks and control in MANET

M Rath, J Swain, B Pati, BK Pattanayak - Handbook of research on …, 2018 - igi-global.com
This chapter describes how with the rapid increase of internet users, more people have
access to global information and communication technology. As a result of which, the issues …

Artificial intelligence based intrusion detection system to detect flooding attack in VANETs

MJS Aneja, T Bhatia, G Sharma… - Handbook of Research …, 2018 - igi-global.com
This chapter describes how Vehicular Ad hoc Networks (VANETs) are classes of ad hoc
networks that provides communication among various vehicles and roadside units. VANETs …

Taxonomy of distributed denial of service (DDoS) attacks and defense mechanisms in present era of smartphone devices

K Sharma, BB Gupta - Research Anthology on Combating Denial-of …, 2021 - igi-global.com
This article describes how in the summer of 1999, the Computer Incident Advisory Capability
first reported about Distributed Denial of Service (DDoS) attack incidents and the nature of …

Denial-of-service (dos) attack and botnet: Network analysis, research tactics, and mitigation

A Arora, SK Yadav, K Sharma - Handbook of Research on Network …, 2018 - igi-global.com
This chapter describes how the consequence and hazards showcased by Denial of Service
attacks have resulted in the surge of research studies, commercial software and innovative …

Cross-layer based intrusion detection and prevention for network

R Kumari, K Sharma - Handbook of Research on Network Forensics …, 2018 - igi-global.com
Day by day technologies for mobile computing growing rapidly and its network security
changed according to their need. The attacker always trying to learn some new techniques …

Denial-of-service and botnet analysis, detection, and mitigation

S Sikkanan, M Kasthuri - … and Risk Management in Mobile and …, 2020 - igi-global.com
The internet is designed for processing and forwarding of any packet in a best effort manner.
The packets carried by the internet may be malicious or not. Most of the time, internet …

Security integration in ddos attack mitigation using access control lists

SK Yadav, K Sharma, A Arora - International Journal of Information …, 2018 - igi-global.com
In this article, the authors propose a DDoS mitigation system through access list-based
configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to …