Security and privacy issues in smart cities/industries: technologies, applications, and challenges

PM Rao, BD Deebak - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

SW Lee, M Mohammadi, S Rashidi… - Journal of Network and …, 2021 - Elsevier
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …

From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions

S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat… - algorithms, 2017 - mdpi.com
In the past few decades, the rise in attacks on communication devices in networks has
resulted in a reduction of network functionality, throughput, and performance. To detect and …

Flow-based intrusion detection: Techniques and challenges

MF Umer, M Sher, Y Bi - Computers & Security, 2017 - Elsevier
Flow-based intrusion detection is an innovative way of detecting intrusions in high-speed
networks. Flow-based intrusion detection only inspects the packet header and does not …

Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network

P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …

A novel support vector machine based intrusion detection system for mobile ad hoc networks

EA Shams, A Rizaner - Wireless Networks, 2018 - Springer
The performance of mobile ad hoc networks (MANETs) is significantly affected by the
malicious nodes. One of the most common attacks in MANETs is denial of service (DoS); a …

A comprehensive survey on mobility-aware D2D communications: Principles, practice and challenges

M Waqas, Y Niu, Y Li, M Ahmed, D Jin… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Device-to-device (D2D) communication proposes a new epitome in mobile networking to
avail data exchange between physically proximate devices. The exploitation of D2D …

Moving ad hoc networks—A comparative study

MA Al-Absi, AA Al-Absi, M Sain, H Lee - Sustainability, 2021 - mdpi.com
An ad hoc network is a wireless mobile communication network composed of a group of
mobile nodes with wireless transceivers. It does not rely on preset infrastructure and is …

Energy Auditing and Broken Path Identification for Routing in Large‐Scale Mobile Networks Using Machine Learning

N Venu, M Revanesh, M Supriya… - Wireless …, 2022 - Wiley Online Library
In mobile computing, all nodes are movable nodes, which causes many problems for
transmitting data packets in a sequence manner; since the mobile nodes are connected with …

An evolutionary self-cooperative trust scheme against routing disruptions in MANETs

RJ Cai, XJ Li, PHJ Chong - IEEE transactions on Mobile …, 2018 - ieeexplore.ieee.org
How to achieve reliable routing has always been a major issue in the design of
communication networks, among which mobile ad hoc networks (MANETs) possess the …