To search, Click below search items.
All Published Papers Search Service
Title
Analysis of MANET¡¯s Routing Protocols, Security Attacks and Detection Techniques- A Review
Author
Amina Yaqoob Alma Shamas Jawwad Ibrahim
Vol. 24 No. 6 pp. 23-32
Keywords
Routing Protocols, DSDV, AODV, DSR, TORA, ZRP, Security Attacks, Detection Techniques
Blockchain-based authentication for IoT
Alaa Alsubhi. Jawaher Alhrthi and Wajdi Alhakami
Vol. 24 No. 5 pp. 198-204
Blockchain, IoT, authentication, security
Malwares Attack Detection Using Ensemble Deep Restricted Boltzmann Machine
K. Janani, R. Gunasundari
Vol. 24 No. 5 pp. 64-72
Cybersecurity, Deep Learning, Restricted Boltzmann Machine, Malware
Enhancing Cyber-Physical Systems Security: A Comprehensive SRE Approach for Robust CPS Methodology
Shafiq ur Rehman
Vol. 24 No. 5 pp. 40-52
Cyber-Physical Systems (CPS), Security, Security Requirements Engineering, Threats, Healthcare.