[PDF][PDF] A survey on MANETs: Architecture, evolution, applications, security issues and solutions

BUI Khan, RF Olanrewaju, F Anwar… - Indonesian Journal of …, 2018 - researchgate.net
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are
self-configuring networks of mobile devices that are joined using wireless channels. These …

Experimental evaluation of security monitoring and notification on network intrusion detection system for server security

MA Helmiawan, E Julian, Y Cahyan… - 2021 9th International …, 2021 - ieeexplore.ieee.org
Security of data and information in servers connected to networks that provide services to
user computers, is the most important thing to maintain data privacy and security in network …

Offline OTP based solution for secure internet banking access

BUI Khan, RF Olanrewaju, F Anwar… - 2018 IEEE Conference …, 2018 - ieeexplore.ieee.org
Numerous applications are available on the Internet for the exchange of personal
information and money. All these applications need to authenticate the users to confirm their …

Bayesian signaling game based efficient security model for MANETs

RF Olanrewaju, F Anwar, RN Mir, M Yaacob… - Advances in Information …, 2020 - Springer
Game Theory acts as a suitable tool offering promising solutions to security-related concerns
in Mobile Ad Hoc Networks (ie, MANETs). In MANETs, security forms a prominent concern …

[PDF][PDF] A new approach to improving web application firewall performance based on support vector machine method with analysis of http request

NM Thang, TP Ho, HT Nam - Journal of Science and …, 2022 - scholar.archive.org
Amount of attacks on information system is rapidly increasing not only in numbers but also in
quality. Each attack violates properties of confidentiality, integrity, and accessibility of …

Evaluating the effectiveness of free rule sets for Snort

N Granberg - 2022 - diva-portal.org
As more of the modern world is connected to the Internet, threats can reach further than ever
before. Attacks happen all the time and many have serious consequences that disrupts the …

[PDF][PDF] ECM-GT: Design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET

BUI Khan, RF Olanrewaju, F Anwar… - International Journal of …, 2019 - researchgate.net
Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or
MANET) security. In MANETs, coordination among the portable nodes is more significant …

Mimicking attack by botnet and detection at gateway

V Rama Krishna, R Subhashini - Peer-to-Peer Networking and …, 2020 - Springer
In cyber world Botnets becoming more popular and great challenge to security. Attacker by
using bot net taking legacy attacks towards new dimension. Existing Intrusion …

Implementation of signature based intrusion detection system with snort rule on e-voting system

MAK AS, EP Nugroho, R Rachman - Journal of Computers for …, 2023 - ejournal.upi.edu
Security is an important thing for everyone, including network security, which everyone
needs, including the security at web server, there are problems encountered on the server …

An appraisal for the identification of a novel approach to IDPS in cloud environment

V Dhawan, S Rani, LK Joshi - AIP Conference Proceedings, 2023 - pubs.aip.org
Due to the rapid growth of distributed systems, IT organizations are inclining toward the
cloud computing environment. The technology for accumulating and preserving the user's …