Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Malicious Activities Prediction Over Online Social Networking Using Ensemble Model

    S. Sadhasivam1, P. Valarmathie2, K. Dinakaran3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 461-479, 2023, DOI:10.32604/iasc.2023.028650 - 29 September 2022

    Abstract With the vast advancements in Information Technology, the emergence of Online Social Networking (OSN) has also hit its peak and captured the attention of the young generation people. The clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original user. However, the attackers also target this height of OSN utilization, explicitly creating the clones of the user’s account. Various clone detection mechanisms are designed based on social-network activities. For instance, monitoring the occurrence of clone edges is done to restrict the generation of clone activities.… More >

  • Open Access

    ARTICLE

    Detection and Avoidance of Clone Attack in IoT Based Smart Health Application

    S. Vaishnavi1,*, T. Sethukarasi2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1919-1937, 2022, DOI:10.32604/iasc.2022.021006 - 09 October 2021

    Abstract The deployment of wireless sensors in the hostile environment makes them susceptible to malicious attacks. One of the most harmful attacks is the clone attack in which a malicious node illegitimately claims the identity of a genuine node in the network and eventually tries to capture the entire network. This attack is also termed as node replication attack. The mobile nature of wireless sensor network (WSN) in smart health environment increases the vulnerability of node replication attack. Since the data involved in smart health system are highly sensitive data, preserving the system from the attack… More >

Displaying 1-10 on page 1 of 2. Per Page