To search, Click below search items.
All Published Papers Search Service
Title
Analysis of MANET¡¯s Routing Protocols, Security Attacks and Detection Techniques- A Review
Author
Amina Yaqoob Alma Shamas Jawwad Ibrahim
Vol. 24 No. 6 pp. 23-32
Keywords
Routing Protocols, DSDV, AODV, DSR, TORA, ZRP, Security Attacks, Detection Techniques
Blockchain-based authentication for IoT
Alaa Alsubhi. Jawaher Alhrthi and Wajdi Alhakami
Vol. 24 No. 5 pp. 198-204
Blockchain, IoT, authentication, security
Secure and Resilient Framework for Internet of Medical Things (IoMT) with an Effective Cybersecurity Risk Management
Latifah Khalid Alabdulwahhab, Shaik Shakeel Ahamad
Vol. 24 No. 5 pp. 73-78
Internet of Medical Things (IoMT); Risk Management; PILAR Risk Management Tool; Risk Impact Parameters (RIP), UICC (Universal Integrated Circuit Card); TPM (Trusted Platform Module)
Malwares Attack Detection Using Ensemble Deep Restricted Boltzmann Machine
K. Janani, R. Gunasundari
Vol. 24 No. 5 pp. 64-72
Cybersecurity, Deep Learning, Restricted Boltzmann Machine, Malware