[HTML][HTML] Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications
Abstract Wireless Body Area Network (WBAN) is a new trend in the technology that provides
remote mechanism to monitor and collect patient's health record data using wearable …
remote mechanism to monitor and collect patient's health record data using wearable …
Attack in smartphone Wi-Fi access channel: State of the art, current issues, and challenges
K Sharma, BB Gupta - Next-Generation Networks: Proceedings of CSI …, 2018 - Springer
Today, Smartphone device uses are increasing day-by-day such as email, gaming, Internet
banking, which requires it to always remain connected with Wi-Fi. This makes it vulnerable …
banking, which requires it to always remain connected with Wi-Fi. This makes it vulnerable …
Flawed security of social network of things
This chapter deals with the security flaws of social network of things. The network of things
(NoT) is a dynamic structure that is basically an interface of real world and virtual world …
(NoT) is a dynamic structure that is basically an interface of real world and virtual world …
Network security: attacks and control in MANET
This chapter describes how with the rapid increase of internet users, more people have
access to global information and communication technology. As a result of which, the issues …
access to global information and communication technology. As a result of which, the issues …
Artificial intelligence based intrusion detection system to detect flooding attack in VANETs
This chapter describes how Vehicular Ad hoc Networks (VANETs) are classes of ad hoc
networks that provides communication among various vehicles and roadside units. VANETs …
networks that provides communication among various vehicles and roadside units. VANETs …
Taxonomy of distributed denial of service (DDoS) attacks and defense mechanisms in present era of smartphone devices
K Sharma, BB Gupta - Research Anthology on Combating Denial-of …, 2021 - igi-global.com
This article describes how in the summer of 1999, the Computer Incident Advisory Capability
first reported about Distributed Denial of Service (DDoS) attack incidents and the nature of …
first reported about Distributed Denial of Service (DDoS) attack incidents and the nature of …
Denial-of-service (dos) attack and botnet: Network analysis, research tactics, and mitigation
This chapter describes how the consequence and hazards showcased by Denial of Service
attacks have resulted in the surge of research studies, commercial software and innovative …
attacks have resulted in the surge of research studies, commercial software and innovative …
Cross-layer based intrusion detection and prevention for network
Day by day technologies for mobile computing growing rapidly and its network security
changed according to their need. The attacker always trying to learn some new techniques …
changed according to their need. The attacker always trying to learn some new techniques …
Denial-of-service and botnet analysis, detection, and mitigation
S Sikkanan, M Kasthuri - … and Risk Management in Mobile and …, 2020 - igi-global.com
The internet is designed for processing and forwarding of any packet in a best effort manner.
The packets carried by the internet may be malicious or not. Most of the time, internet …
The packets carried by the internet may be malicious or not. Most of the time, internet …
Security integration in ddos attack mitigation using access control lists
In this article, the authors propose a DDoS mitigation system through access list-based
configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to …
configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to …