Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Cryptographic Algorithm for Enhancing Data Security in Wireless IoT Sensor Networks

    A. Bhavani, V. Nithya*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1381-1393, 2023, DOI:10.32604/iasc.2023.029397 - 05 January 2023

    Abstract Wireless IoT Sensor Network can handle audio, video, text, etc., through the interconnection of ubiquitous devices. The entertainment and application-centric network relies on its autonomous nodes for handling large streams of multimedia data. Security breaches and threats due to insider attacks reduce the data handling and distribution capacity of the nodes. For addressing the insider attacks problem, Session-Critical Distributed Authentication Method (SCDAM) is proposed. The proposed method relies on short-lived concealed authentication based on an improved elliptic curve cryptography (ECC) algorithm. In this authentication, the session time and the interrupts are accounted for, providing end-to-end More >

  • Open Access

    ARTICLE

    Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing

    A. S. Anakath1,*, R. Kannadasan2, Niju P. Joseph3, P. Boominathan4, G. R. Sreekanth5

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 479-492, 2022, DOI:10.32604/csse.2022.019940 - 25 October 2021

    Abstract Cloud computing is a high network infrastructure where users, owners, third users, authorized users, and customers can access and store their information quickly. The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently. This cloud is nowadays highly affected by internal threats of the user. Sensitive applications such as banking, hospital, and business are more likely affected by real user threats. An intruder is presented as a user and set as a member of the network. After becoming an insider… More >

  • Open Access

    ARTICLE

    User Behavior Traffic Analysis Using a Simplified Memory-Prediction Framework

    Rahmat Budiarto1,*, Ahmad A. Alqarni1, Mohammed Y. Alzahrani1, Muhammad Fermi Pasha2, Mohamed Fazil Mohamed Firdhous3, Deris Stiawan4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2679-2698, 2022, DOI:10.32604/cmc.2022.019847 - 27 September 2021

    Abstract As nearly half of the incidents in enterprise security have been triggered by insiders, it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software (malware) in real-time. Failing to do so may cause a serious loss of reputation as well as business. At the same time, modern network traffic has dynamic patterns, high complexity, and large volumes that make it more difficult to detect malware early. The ability to learn tasks sequentially is crucial to the development of artificial intelligence.… More >

Displaying 1-10 on page 1 of 3. Per Page