AA Ahmed - Digital Forensics and Forensic Investigations …, 2020 - igi-global.com
Sensitive information has critical risks when transmitted through computer networks. Existing protection systems still have limitations with treating network information with sufficient …
AA Ahmed, NAK Zaman - Int. J. Netw. Secur., 2017 - academia.edu
Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information …
N Liao, S Tian, T Wang - Computer Communications, 2009 - Elsevier
Network forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. In the …
The term cyber threat intelligence refers to evidence-based knowledge that has been collected, processed, and analyzed to understand about the threat existing or emerging …
S Gupta, BS Chaudhari… - … conference on inventive …, 2016 - ieeexplore.ieee.org
Wireless network is growing explosively not only in the corporate environment but also at the consumer space. If the network is left open and unsecured, anyone can not only use the …
MG Haricharan, SP Govind… - … for Advancement in …, 2023 - ieeexplore.ieee.org
With the advancement of the internet over the years, the number of attacks over the internet has also increased. A powerful intrusion detection system (IDS) is required to ensure the …
The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. Network attacks refer …
P Uyyala - Journal of interdisciplinary cycle research, 2022 - hcommons.org
Contrasted with the past, improvements in PC and correspondence innovations have given broad and propelled changes. The use of new innovations give incredible advantages to …
The evolving new and modern technologies raise the risks in the network which will be affected by several attacks and thus give rise to developing efficient network attack detection …