Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity …
VN Thatha, S Donepudi, MA Safali… - International Journal of …, 2023 - core.ac.uk
Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both costeffective and scalable …
L Ran, Y Cui, J Zhao, H Yang - Plos one, 2024 - journals.plos.org
The decoupling of control and forwarding layers brings Software-Defined Networking (SDN) the network programmability and global control capability, but it also poses SDN security …
In 5G cellular communication systems, achieving low latency is crucial to support the 'tactile'Internet with response times of less than one millisecond. Traditional initial …
F Qiu, H Xu, F Li - Electronic Research Archive, 2024 - aimspress.com
As a meta-heuristic algorithm, the Golden Jackal Optimization (GJO) algorithm has been widely used in traditional network intrusion detection due to its ease of use and high …
A Tungal, K Singh, P Singh, G Singh… - 2023 10th IEEE Uttar …, 2023 - ieeexplore.ieee.org
Pandemics are disasters that create havoc on the entire planet by spreading infectious diseases at an unprecedented rate. Recently, the Covid-19 virus has caused massive levels …
I Aqeel - 2023 3rd International Conference on Computing and …, 2023 - ieeexplore.ieee.org
Submarine WSNs are currently engaged in extensive research in a new setting for the benefit of people. UWSNs are regarded as one of the fastest-growing technical domains due …
Analysis of forest fires True video surveillance is a challenging task. The same is due to differences in appearance, changes in lighting, and variations in speeds. This study …
YM Xuan, MTY Xuen, S Muzafar - 2023 - preprints.org
The reliance on cloud computing services and related technologies has increased due to their many benefits, including resource sharing and the need for organizations to maintain …