WA Ali, KN Manasa, M Bendechache… - … and the Digital …, 2020 - search.informit.org
Due to the advance in network technologies, the number of network users is growing rapidly, which leads to the generation of large network traffic data. This large network traffic data is …
H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the scope of cybersecurity research topics. This paper proposes a grouping and classifications …
Ad hoc networks are a new perspective of wireless communication for versatile hosts. Security is a colossal worry for ad hoc networks, especially for those security-touchy …
Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very challenging and computationally expensive task. Feature selection (FS) is an approach to …
Intrusion detection has become important to network security because of the increasing connectivity between computers and internet. Various Intrusion Detection Systems have …
Computationally expensive applications, including machine learning, chemical simulations, and financial modeling, are promising candidates for noisy intermediate scale quantum …
M Aslan, S Sen - Vehicular Communications, 2023 - Elsevier
Trust management in vehicular ad hoc networks (VANETs) is a challenging dynamic optimization problem due to their decentralized, infrastructureless, and dynamically …
KMK Raghunath, VV Kumar… - Journal of Web …, 2022 - ieeexplore.ieee.org
Massive reliance on practical systems has resulted in several security concerns. The ability to identify anomalies is a critical safety feature enabled by anomaly diagnostic techniques …
With the increased digital usage, web visibility has become critically essential for organizations when catering to a larger audience. This visibility on the web is directly related …