过去一年中添加的文章,按日期排序

Barnacles Mating Optimizer with Hopfield Neural Network Based Intrusion Detection in Internet of Things Environment

R Velumani, VK Kalimuthu - Tehnički vjesnik, 2023 - hrcak.srce.hr
244 天前 - … and privacy challenges with identifying distinct IoT attacks… An intrusion detection
system (IDS) is an administrative … device and it takes account of the reported hostname, routing

[HTML][HTML] 3R: A reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks

MS Hajar, HK Kalutarage, MO Al-Kadri - Computer Networks, 2023 - Elsevier
249 天前 - … our routing protocol against well-known dropping attacks. … by deploying cryptographic
security measures, such as … that secure mutual authentication is achieved and security

[引用][C] Simulation of Blackhole Attack in WSN Cluster Topology

O Saha, MJ Rana, MR Miah, M Alamin - 2023 - Sonargaon University (SU)

Advances in Communication and Applications

NR Shetty, NH Prasad, HC Nagaraj - Proceedings of ERCICA, 2023 - Springer
256 天前 - … He obtained his ME in Communication Systems from PSG College of Technology,
Bharathiar University in 1984 and secured first rank. He received his doctoral degree in the …

Data Security Testing for Sensor Networks in IoT Environments

W Lang - … on I-SMAC (IoT in Social, Mobile, Analytics and …, 2023 - ieeexplore.ieee.org
258 天前 - … information data, and then establish the routing in the form of the single-hop or …
attacks under the premise of security and control, discovering weaknesses in the network system

A REVIEW OF SECURITY CHALLENGES AND SOLUTIONS IN WIRELESS SENSOR NETWORKS

K Hassan, MA Madkour… - Journal of Al-Azhar …, 2023 - jaes.journals.ekb.eg
268 天前 - … models and intrusion detection systems are considered … a summary of the most
important routing attacks [11, 47]. … In conclusion, the development of secure routing protocols for …

Software-Defined Access Control in Smart Grids

G Karmakar, R Naha, R Shah… - 2023 33rd …, 2023 - ieeexplore.ieee.org
274 天前 - … model in the edge routers/devices based on the user and … Therefore, ensuring
energy security is of paramount … various security threats, such as impersonation attacks, smart …

Two-factor authentication protocol based on PUF function in Internet of Vehicles

Z Tian, Y He, Y Liu, S Liu, J Quan - Proceedings of the 2023 6th …, 2023 - dl.acm.org
277 天前 - … ) in transportation, enhances vehicle management and route planning … security
analysis demonstrates the protocol’s resilience against various known attacks, ensuring system

A Dependable and Secure Communication Infrastructure for Sensor Networks

AV Krishna, IRP Reddy, AA Leema… - … : Proceedings of 6th …, 2023 - books.google.com
280 天前 - … We created a secured communication system for these … security solution for detecting
and preventing RPL attacks … work on topics including secure routing and energy efficiency. …

Effective detection of DoS attack in wireless sensor network using ASFO algorithm and Improved Deep Convolutional Neural Network

S Ramalingam - 2023 - researchsquare.com
281 天前 - … for detecting and protecting against DDoS attacks on … NS-2 network simulator
LEACH-based routing protocol to … -based intrusion detection system for cluster-based WSNs …