K Sudharson, NS Usha, G Babu… - 2023 7th …, 2023 - ieeexplore.ieee.org
Data mining and quantum computing have become potent methods for analyzing massive datasets and gaining insightful conclusions. However, conventional techniques for data …
This paper proposes a novel and implementable hybrid algorithm for wireless intrusion detection systems (WIDS) that combines machine learning techniques with a new post …
The popular cryptosystem technology with a realistic way to a highly secure and a smaller encryption bit size is known as Hyper Elliptical Curve Cryptography (HECC). The key …
S Li, B Gong - High-Confidence Computing, 2023 - Elsevier
Mobile ad hoc networks (MANETs), which correspond to a novel wireless technology, are widely used in Internet of Things (IoT) systems such as drones, wireless sensor networks …
Dermatec, a pioneering healthcare research initiative, utilizes advanced machine-learning methods to address chronic dermatological conditions. Integrating robust data …
Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node …
Strong security is essential in the ever-changing world of web applications to ward off potential dangers. To identify various network vulnerabilities like Cross-Site Scripting …
A Kavitha, VS Meenakshi - … Journal of Intelligent Engineering & Systems, 2024 - inass.org
Mobile Adhoc Networks (MANETs) are vulnerable to various attacks such as Black Hole Attack (BHA), Gray Hole Attack (GHA), and Wormhole Attacks (WHA). While researchers …
K Dhivya, K Premkumar, K Balasaranya… - … conference on edge …, 2023 - ieeexplore.ieee.org
An Autonomous Mobile Network (AMN) is a wireless network in which no structure is accessible. AMN has significantly assisted in many applications recently. The AMN is often …