Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
IPv6 Migration Strategy Using Carrier Grade Network Address Translation
Dipti Chauhan
Evaluating Linear and Non-linear Dimensionality Reduction Approaches for Deep Learning-based Network Intrusion Detection Systems
Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere
An Enhanced Method Utilizing Hopfield Neural Model for Mobile Agent Protection
Pradeep Kumar, Niraj Singhal, Ajay Kumar, Kakoli Banerjee
Enhancing the Cloud Security through RC6 and 3DES Algorithms while Achieving Low-Cost Encryption
Chandra Shekhar Tiwari, Vijay Kumar Jha
Interpretable Fuzzy System for Malicious Domain Classification Using Projection Neural Network
Rajan Prasad, Praveen Kumar Shukla
A New Framework of Honeypots Network Security Using Linear Regression Decision Algorithm
Avijit Mondal, Radha Tamal Goswami, Soumita Sen
Mitigation of Byzantine attack using LSP algorithm in CR Networks through Blockchain Technology
Amith K.S., Yerriswamy T.
An Analytical Study of Cloud Security Enhancements
Imran Khan, Tanya Garg
A Novel Approach by Integrating Dynamic Network Selection and Security Measures to improve Seamless Connectivity in Ubiquitous Networks
Prasanna Kumar G., Shankaraiah N., Rajashekar M.B., Sudeep J., Shruthi B.S., Darshini Y., Manasa K.B.
Enhancing Cybersecurity through Bayesian Node Profiling and Attack Classification
Priyanka Desai
Programming SDNs: A Compass for SDN Programmer
Suhail Ahmad, Ajaz Hussain Mir
A Novel Framework for Real-Time IP Reputation Validation Using Artificial Intelligence
NW Chanaka Lasantha, Ruvan Abeysekara, MWP Maduranga
AI-Driven Network Security: Innovations in Dynamic Threat Adaptation and Time Series Analysis for Proactive Cyber Defense
Mansoor Farooq, Mubashir Hassan Khan
Cryptographic Resilience and Efficiency: A Comparative Study of NTRU and ECC Cryptographic Mechanisms for Internet of Medical Things
Alina Pervaiz, Adil Bashir, Maheen Fayaz, Numrena Farooq, Ajaz Hussain Mir
An Evaluation of Systems for Detection and Prevention of DoS Attacks in SDN Networks
Maurizio D’Arienzo
Improved Route Discovery Scheme under Blackhole Attack in MANET
Priyanka Pandey, Raghuraj Singh
Enterprise Private Cloud Platforms: A Systematic Review of Key Vendors
Mykhailo Khomchak
A Survey on the impact of Connection-Aware Congestion Identification in RLNC-Based Networks on Quality of Service
Syed Abid Husain, Baswaraj Gadgay, Shubhangi D.C.
Scheduling and Queuing Strategies for Energy Efficient Routings in WMSNs
Ashok K. Chikaraddi, Meena S. Maralappanavar, Suvarna G. Kanakaraddi, Vishwanath Chikkareddi
Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS
Gilson da Silva Francisco, Anderson Aparecido Alves da Silva, Marcelo Teixeira de Azevedo, Eduardo Takeo Ueda, Adilson Eduardo Guelfi, Jose Jesus Perez Alcazar
Integrated Spatial and Temporal Features Based Network Intrusion Detection System Using SMOTE Sampling
Shrinivas A. Khedkar, Madhav Chandane, Rasika Gawande
Detecting Android Malware by Mining Enhanced System Call Graphs
Rajif Agung Yunmar, Sri Suning Kusumawardani, Widyawan Widyawan, Fadi Mohsen
Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT
Dilip Kumar, Manoj Kumar
A Secure VM Placement Strategy to Defend against Co-residence Attack in Cloud Datacentres
Ankita Srivastava, Narander Kumar
Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
An Efficient and Secure Blockchain Consensus Algorithm Using Game Theory
Naveen Arali, Narayan D.G., Altaf Husain M., P.S. Hiremath
A Hybrid Intrusion Detection System to Mitigate Biomedical Malicious Nodes
Mohammed Abdessamad Goumidi, Ehlem Zigh, Naima Hadj-Said, Adda Belkacem Ali-Pacha
Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method
Ranganath Yadawad, Umakant P. Kulkarni, Jafar A. Alzubi
Traitor Traceable and Revocation-oriented Attribute Based Encryption with Proxy Decryption for Cloud Devices
G. Sravan Kumar, A. Sri Krishna
A Novel Privacy Preservation Scheme by Matrix Factorized Deep Autoencoder
Pooja Choudhary, Kanwal Garg
Optimized Extreme Gradient Boosting with Remora Algorithm for Congestion Prediction in Transport Layer
Ajay Kumar, Naveen Hemrajani
Quality of Experience Improvement and Service Time Optimization through Dynamic Computation Offloading Algorithms in Multi-access Edge Computing Networks
Marouane Myyara, Oussama Lagnfdi, Anouar Darif, Abderrazak Farchane
Cascaded Machine Learning Approach with Data Augmentation for Intrusion Detection System
Argha Chandra Dhar, Arna Roy, M.A.H. Akhand, Md. Abdus Samad Kamal, Kou Yamada
Secure Data Storage and Retrieval over the Encrypted Cloud Computing
Jaydip Kumar, Hemant Kumar, Karam Veer Singh, Vipin Saxena
BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment
Santhosh Kumar Medishetti, Ganesh Reddy Karri
Chaotic Map based Random Binary Key Sequence Generation
Vishwas C.G.M., R. Sanjeev Kunte
Survival Analysis of Computers at a University’s Computer Laboratory and Implication on Maintainability
Timothy Simpson, Joseph Danso, John Awuah Addor, Stephen Graham Anaman
Determination of Security Factors Affecting Internet of Medical Things by Artificial Intelligence Technique
Mohd. Nadeem, Prabhash Chandra Pathak, Mahfooz Ahmad, Masood Ahmad
Classification of Food Objects Using Deep Convolutional Neural Network Using Transfer Learning
Dipta Gomes
Data Analysis and Success Prediction of Mobile Games before Publishing on Google Play Store
Muhammad Muhtasim, Md. Showrov Hossen