As the alarming growth of computer connectivity and the significant number of computer- related applications increased lately, the challenge of achieving cyber-security has become …
JA Khan, N Jain - International journal of scientific research in …, 2016 - academia.edu
This paper describes a hybrid design for intrusion detection that combines anomaly detection with misuse detection. The proposed method includes an ensemble feature …
R Mehta, MM Parmar - 2018 3rd International Conference for …, 2018 - ieeexplore.ieee.org
Internet of Things is attracting a lot of interest in the modern world and has become a part of daily life leading to a large scale of distribution of Low power and Lossy Networks (LLN). For …
I Hidayat, MZ Ali, A Arshad - Journal of Computational and …, 2023 - ojs.bonviewpress.com
Recently, networks are moving toward automation and getting more and more intelligent. With the advent of big data and cloud computing technologies, lots and lots of data are being …
BH Patel, P Shah - … Telecommunication Computing Electronics …, 2020 - telkomnika.uad.ac.id
To make possible dream of connecting 30 billion smart devices assessable from anywhere, anytime and to fuel the engine growth of Internet of things (IoT) both in terms of physical and …
S Shin, K Kim, T Kwon - International Journal of Ad Hoc and …, 2019 - inderscienceonline.com
The routing protocol for low-power and lossy networks (RPL) is an IPv6-based routing protocol optimised for internet of things (IoT) environments. However, it is susceptible to …
D Hemanand, RR Vallem - Mesopotamian …, 2023 - journals.mesopotamian.press
Nowadays, we are moving towards cybersecurity against digital attacks to protect systems, networks, and data in developing areas. A collection of technologies and processes is at the …
AS Ahanger, SM Khan, F Masoodi - Inventive Systems and Control …, 2022 - Springer
In today's digital age, security concerns emerge as a major roadblock, as it compromise privacy of users. With the appearance of latest technologies, there is colossal data available …
P Aravamudhan - Plos one, 2023 - journals.plos.org
Cyber-attack is one of the most challenging aspects of information technology. After the emergence of the Internet of Things, which is a vast network of sensors, technology started …