All Stories

  1. Cloud Survivability Scenarios Under Attacks With and Without Countermeasures
  2. Detecting and mitigating DIS attack in RPL-based network
  3. Reinforcing Cloud Attack Tolerance on a Large Scale: Advanced Blockchain Technologies With Hierarchical Risk and Smart Contracts
  4. Securing RPL-Based Networks Against Version Number and Rank Attacks
  5. An adaptive formal parallel technique with reputation integration for the enforcement of security policy in the cloud environment
  6. Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments
  7. DS-kNN
  8. Proposed method: Mean Delays Synchronization Protocol (MDSP) for Wireless Sensor Networks
  9. 3HA: Hybrid Hole Healing Algorithm in a Wireless Sensor Networks.
  10. DoS-DDoS: TAXONOMIES OF ATTACKS, COUNTERMEASURES, AND WELL-KNOWN DEFENSE MECHANISMS IN CLOUD ENVIRONMENT
  11. SPMI: Single Phase Multiple Initiator Protocol for Coverage in Wireless Sensor Networks
  12. SPMI: Single Phase Multiple Initiator Protocol for Coverage in Wireless Sensor Networks
  13. Increasing QoS Parameters in WSNs through Spiral-Based Clustered Architecture
  14. ESA: An Efficient Self-deployment Algorithm for Coverage in Wireless Sensor Networks
  15. Kernel methods to detect intruders
  16. Towards Using Games Theory to Detect New U2R Attacks
  17. Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks
  18. Maximizing bandwidth in wireless sensor networks using TDMA protocol
  19. BCP: A Border Coverage Protocol for wireless sensor networks
  20. CAC-UA: A Communicating Ant for Clustering to detect unknown attacks
  21. SELECTING KDD FEATURES AND USING RANDOM CLASSIFICATION TREE FOR PREDICTING ATTACKS
  22. K-MEANS FOR MODELLING AND DETECTING ANOMALOUS PROFILES
  23. HIERARCHICAL CLUSTERING ALGORITHM FOR DETECTING ANOMALOUS PROFILES IN COMPUTER SYSTEMS
  24. Securing Wireless Sensor Networks: A Survey
  25. Coverage and connectivity protocol for Wireless Sensor Networks
  26. Efficient coverage protocol without location information
  27. A Data Analysis-Based Approach for Detecting Intruders
  28. Critical Study of Supervised Learning Techniques in Predicting Attacks
  29. Modelling intrusion detection as an allocation problem
  30. Efficient deterministic method for detecting new U2R attacks
  31. Critical study of neural networks in detecting intrusions
  32. Improving the Profibus medium access control protocol
  33. Modelling and solving the intrusion detection problem in computer networks
  34. Improving the Timed Token Protocol