Trust based fake node identification in social networking sites

AS Spoorthy - IOP Conference Series: Materials Science and …, 2021 - iopscience.iop.org
Abstract In recent years Social Networking is very commonly used for communications. It is
the platform where users are free to join and share their data between groups of people …

Distributed Denial of Service Attack Detection and Prevention in Local Area Network

S Sinha, N Mahadev Prasad - Innovative Data Communication …, 2022 - Springer
DDOS attack detection has become more challenging due to the exponential growth of
network traffic and its diversity on the Internet. The main goal of this research work is to …

Activity Oriented Malicious Node Identification for Packet Drop Attack in WSN

B Shwetha, IB Brunda, S Sinha - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) have become increasingly popular in various areas.
Attacks on WSN can occur in a variety of ways depending on the type of harmful behaviour …

Multiple black hole attack in mobile ad hoc network-analysis and detection

T Harshini, S Sinha - ICASISET 2020: Proceedings of the First …, 2021 - books.google.com
Mobile ad-hoc network is a short-lived and self-prepared wireless community including
mobile nodes. Therefore, safety in MANET, the fundamental functionality of the network is of …

Monitoring Login Shell Alert Notification Application

BJS Kumar, S Sinha - 2021 5th International Conference on …, 2021 - ieeexplore.ieee.org
Remote monitoring and maintaining logs of each user activities is a cumbersome task for an
administrator. Most of organization needs tools for monitoring user login activities and today …

Modeling of Secure Authentication Schemes in Cloud Computing based on Hybrid Data Classification

S Harshitha, K Suresh… - 2022 IEEE Global …, 2022 - ieeexplore.ieee.org
There are numerous ways to categories cloud computing services, including scalability,
availability, and a broad range of services. Without paying any additional fees, cloud …

Routing path discovery in WSN based on Energy consumption and average delay-Centralized & Distributed approach

P Mohan, CN Rishika - 2022 IEEE North Karnataka Subsection …, 2022 - ieeexplore.ieee.org
Wireless sensor networks comprise several sensor nodes that may be positioned in different
environmental conditions. WSNs are made up of low-power sensor nodes and these nodes …