Study of Decentralized Database Network using concepts of Blockchain

C Puviraj, B Nikhil, SB Vishal… - … , Automation & Smart …, 2021 - ieeexplore.ieee.org
The data stored in traditional database systems are vulnerable to attacks even with the
existence of certain levels of security. In order to overcome such drawbacks, a dynamic …

[PDF][PDF] Integration of antivirus with virtual private network for personal systems security

SSA Naqvi, J Samuel - International Journal of Information System …, 2017 - researchgate.net
Virtual private network was developed to help users protect and better control their internet
connection. However, virtual private network cannot protect users from viruses, hacking …

[PDF][PDF] Identifying Malicious Data in Social Media

MSL Yellari, M Manisha, J Dhanesh… - … Research Journal of …, 2017 - academia.edu
Network anomaly detection is a broad area of research. The use of entropy and distributions
of traffic features has received a lot of attention in the research community. Disclosing …

Computer Architecture: A New Weapon to Secure Web Services From Bots

AK Singh, GC Gandhi - International Journal of Smart Security …, 2020 - igi-global.com
It is a well-known fact that the expansion of Internet has given rise to many daily activities
which are being done online including financial and personal data transactions which has …

The entangled cyberspace: an integrated approach for predicting cyber-attacks

RE Ikwu - 2018 - bura.brunel.ac.uk
Significant studies in cyber defence analysis have predominantly revolved around a single
linear analysis of information from a single source of evidence (The Network). These studies …

[引用][C] An Integrated Security System for Home Users

S Dhanalakshmi, S Soundariya, T Thangarani