BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithm

S Abbas, Z Jalil, AR Javed, I Batool, MZ Khan… - PeerJ Computer …, 2021 - peerj.com
Breast cancer is one of the leading causes of death in the current age. It often results in
subpar living conditions for a patient as they have to go through expensive and painful …

Applications in security and evasions in machine learning: a survey

R Sagar, R Jhaveri, C Borrego - Electronics, 2020 - mdpi.com
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …

Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT

RH Jhaveri, NM Patel, Y Zhong, AK Sangaiah - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital
role in future Industrial Internet-of-Things communication, where smart devices will be …

A robust NIfTI image authentication framework to ensure reliable and safe diagnosis

S Basheer, KU Singh, V Sharma, S Bhatia… - PeerJ Computer …, 2023 - peerj.com
Advancements in digital medical imaging technologies have significantly impacted the
healthcare system. It enables the diagnosis of various diseases through the interpretation of …

APD-JFAD: accurate prevention and detection of jelly fish attack in MANET

S Doss, A Nayyar, G Suseendran, S Tanwar… - Ieee …, 2018 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) are surrounded by tons of different attacks, each with
different behavior and aftermaths. One of the serious attacks that affect the normal working of …

A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

GM Borkar, AR Mahajan - International Journal of …, 2020 - inderscienceonline.com
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in
modern technology for transmitting the packets from source node to destination node. The …

Wormhole attack detection techniques in ad-hoc network: A systematic review

C Gupta, L Singh, R Tiwari - Open Computer Science, 2022 - degruyter.com
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …

Routing protocols & unmanned aerial vehicles autonomous localization in flying networks

IU Khan, SBH Shah, L Wang, MA Aziz… - International Journal …, 2021 - Wiley Online Library
Nowadays, as the world is transformed because of the interconnectivity, there we see
several issues regarding security which is supposed to be one of the biggest problems for …

Cyber‐Internet Security Framework to Conquer Energy‐Related Attacks on the Internet of Things with Machine Learning Techniques

A Kumar, D Dhabliya, P Agarwal… - Computational …, 2022 - Wiley Online Library
The Internet of Things (IoT) ushers in a new era of communication that depends on a broad
range of things and many types of communication technologies to share information. This …

An efficient trust-based scheme for secure and quality of service routing in MANETs

MS Pathan, N Zhu, J He, ZA Zardari, MQ Memon… - Future Internet, 2018 - mdpi.com
Due to the dynamism of topology, sharing of bandwidth and constraint of resources in
wireless nodes, the provision of quality of service (QoS) for routing in mobile ad hoc …