Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

L Liu, Z Ma, W Meng - Future generation computer systems, 2019 - Elsevier
Abstract The Internet of Things (IoT) has experienced a rapid growth in the last few years
allowing different Internet-enabled devices to interact with each other in various …

Provenance data management in health information systems: a systematic literature review

MJ Sembay, DDJ de Macedo, LP Júnior… - Journal of Personalized …, 2023 - mdpi.com
Aims: This article aims to perform a Systematic Literature Review (SLR) to better understand
the structures of different methods, techniques, models, methodologies, and technologies …

Defense against distributed DoS attack detection by using intelligent evolutionary algorithm

S Dwivedi, M Vardhan, S Tripathi - International Journal of …, 2022 - Taylor & Francis
Modern society is prominently dependent on information and communication technology
over the last few decades has carried it with more vulnerability to an enormous variety of …

A detection framework against CPMA attack based on trust evaluation and machine learning in IoT network

L Liu, X Xu, Y Liu, Z Ma, J Peng - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) network is vulnerable to various cyberattacks, especially insider
attacks. Most existing studies mainly detect nontargeted insider attackers, who manipulate …

Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review

O Faraj, D Megias, J Garcia-Alfaro - arXiv preprint arXiv:2407.03466, 2024 - arxiv.org
The Internet of Things (IoT) relies on resource-constrained devices deployed in unprotected
environments. Different types of risks may be faced during data transmission in single-hop …

Exploring the effect of blockchain technology on supply chain resilience and transparency: Evidence from the healthcare industry

Z Alabaddi, A Obidat… - Uncertain Supply Chain …, 2023 - growingscience.com
Blockchain technology is revolutionizing all sectors of industries including the healthcare
one. Blockchain technology applications have been realized in healthcare as they have the …

Implementation of Intrusion Detection Model for Detecting Cyberattacks Using Support Vector Machine

S Ashwini, M Sinha, C Sabarinathan - Advances in Science and …, 2023 - Trans Tech Publ
A Cyber-attack is a deliberate intent to take illegal access to one's computer and data. The
ascent of the web has turned into the groundwork of the vast majority's day-to-day …

An efficient tree-based clone detection scheme in wireless sensor network

S Lalar, S Bhushan, Surender - Journal of Information and …, 2019 - Taylor & Francis
Wireless sensor network has widely used in various applications such as military,
environment monitoring where sensor nodes has operated in open, harsh environment …

Empowering citizens by a blockchain-Based Robinson list

A Cirillo, V Dalena, A Mauro, F Mogavero… - … Journal of Computers …, 2022 - Taylor & Francis
Robinson lists are adopted in many countries to protect phone subscribers against
commercial spam calls. In its essence, they collect the denial of the subscribers to be …

[PDF][PDF] Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node.

N Malhotra, M Bala - Computers, Materials & Continua, 2022 - cdn.techscience.cn
Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In
such attacks, an adversary accesses a few network nodes, generates replication, then …