A survey on internet of things and cloud computing for healthcare

LM Dang, MJ Piran, D Han, K Min, H Moon - Electronics, 2019 - mdpi.com
The fast development of the Internet of Things (IoT) technology in recent years has
supported connections of numerous smart things along with sensors and established …

A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles

Z Hassan, A Mehmood, C Maple, MA Khan… - IEEE …, 2020 - ieeexplore.ieee.org
Detection of Black Hole attacks is one of the most challenging and critical routing security
issues in vehicular ad hoc networks (VANETs) and autonomous and connected vehicles …

An optimized collaborative intrusion detection system for wireless sensor networks

SA Elsaid, NS Albatati - Soft Computing, 2020 - Springer
In wireless sensor networks (WSNs), sensor nodes regularly monitor environment and
transmit measured values for specific phenomena to a central point called base station (BS) …

An authentication protocol for future sensor networks

M Bilal, SG Kang - Sensors, 2017 - mdpi.com
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs)
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …

Sensor networks attacks classifications and mitigation

ASA Daia, RA Ramadan, MB Fayek… - Annals of emerging …, 2018 - papers.ssrn.com
Abstract Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can
be easily compromised. One of the main reasons for these vulnerabilities is the deployment …

BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks

NT Luong, D Hoang - International Journal of Information Security, 2023 - Springer
One of the network performance challenges of Vehicular Ad Hoc Networks (VANET) is the
Black Hole attack. This destructive attack severely damages the network performance if …

[PDF][PDF] Dipper Throated Optimization for Detecting Black-Hole Attacks in MANETs.

R Alkanhel, ESM El-kenawy… - … , Materials & Continua, 2023 - researchgate.net
In terms of security and privacy, mobile ad-hoc network (MANET) continues to be in demand
for additional debate and development. As more MANET applications become data …

[PDF][PDF] Identification of Attacks against Wireless Sensor Networks Based on Behaviour Analysis.

V Korzhuk, A Groznykh, A Menshikov… - J. Wirel. Mob …, 2019 - scholar.archive.org
The paper describes the problem of identification of network layer attacks on wireless sensor
networks for subsequent development of intrusion detection systems. 15 types of behaviour …