The threat of cyber-attacks is ever increasing in today's society. There is a clear need for better and more effective defensive tools. Intrusion detection can be defined as the detection …
D Rajan, P Eswaran, G Srivastava, K Ramana… - Expert …, 2023 - Wiley Online Library
Intelligent and networked vehicles help build an efficient vehicular network's infrastructure. The widespread use of electronic software exposes these networks to cyber‐attacks …
Flash Crowd attacks are a form of Distributed Denial of Service (DDoS) attack that is becoming increasingly difficult to detect due to its ability to imitate normal user behavior in …
OA Hanshal, ON Ucan, YK Sanjalawe - Applied Nanoscience, 2023 - Springer
With the fast advancement in digital news, fake news has already caused grave threats to the public's actual judgment and credibility, in specific, with the wide use of social …
Abstract The Onion Router (TOR) network is a decentralized system of volunteer-run servers that aims to protect the anonymity and privacy of users by routing their internet traffic through …
In the rapidly evolving landscape of cybercrime, ensuring the authenticity and traceability of digital evidence has become paramount. This paper explores the integration of blockchain …
J Wang, J Cheng, Y Yuan, H Li, VS Sheng - International Conference on …, 2022 - Springer
Blockchain technology has gained widespread attention due to its features of decentralization, tamper resistance, and traceability. Various decentralized applications …
Numerous abnormal transactions have been exposed as a result of targeted attacks on Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting …
Abstract Intrusion Detection System (IDS) is a critical cybersecurity task that involves monitoring network traffic for malicious activity and taking appropriate action to stop it …