One effective way of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Despite the increased accuracy of IDSs, distributed or coordinated attacks …
Today's fast expanding use of information technology has led to a dynamic rise in hacking and other unauthorized operations. The variety and quantity of assaults are increasing …
D NancyKirupanithi, A Antonidoss, G Subathra - academia.edu
For data privacy, system reliability, and security, Blockchain technologies have become more popular in recent years. Despite its usefulness, the blockchain is vulnerable to cyber …
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However …
Blockchain is widely adopted by decentralized applications for the strong security guarantees it offers, enabling trusted exchange of transactions in fully distributed peer-to …