Impact of trust and privacy concerns on technology acceptance in healthcare: an Indian perspective

D Dhagarra, M Goswami, G Kumar - International journal of medical …, 2020 - Elsevier
This paper augments the technology acceptance model (TAM) by empirically investigating
the influence of behavioral traits (privacy concerns and trust) and cognitive beliefs …

IDS intelligent configuration scheme against advanced adaptive attacks

Z Xia, J Tan, K Gu, X Li, W Jia - IEEE Transactions on Network …, 2020 - ieeexplore.ieee.org
Currently it becomes more difficult for a single intrusion detection system (IDS) to detect
complex attacks. Based on some cooperative intrusion detection mechanisms, multiple IDSs …

PoAS: Enhanced Consensus Algorithm for Collaborative Blockchain Intrusion Detection System

EA Winanto, MY bin Idris, D Stiawan… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Signature-based Collaborative Intrusion Detection System (CIDS) deeply depends on the
reliability of nodes to produce attack signatures. Each node in the network is responsible to …

Reliable and hybridized trust based algorithm to thwart blackhole attacks in manets using network preponderant determinants

M Thebiga, S Pramila - 2020 - learntechlib.org
This Mobile adhoc networks is a perpetual and autogenous organization without framework,
and the mobile nodes are coupled cordlessly. Owing to the deficiency of framework …