To search, Click below search items.
All Published Papers Search Service
Title
Network Security Practices through Anonymity
Author
Prof. Smitha G R, Suprith C Shekar, Ujwal Mirji
Vol. 24 No. 4 pp. 155-162
Keywords
Online privacy, Anonymity, Networks, Virtual Private Networks, Onion Routing, spoofing
Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India
Simmi Chawla, Parul Tomar, and Sapna Gambhir
Vol. 24 No. 4 pp. 163-169
Internet of Things, STEM education, Low cost, effective learning, Node-Red, Raspberry pi, Python
A DDoS attack Mitigation in IoT Communications Using Machine Learning
Hailye Tekleselase
Vol. 24 No. 4 pp. 170-178
Distributed denial of Service; wireless networks; Machine Learning Algorithms; Transmission Control Protocol; CNN; network security
Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds
Ehtsham Irshad and Abdul Basit Siddiqui
Vol. 24 No. 4 pp. 179-191
Cyber-threat intelligence (CTI), Security Information and event management (SIEM), Intrusion detection system (IDS), Intrusion prevention system (IPS), Denial of service (DoS), Principal component analysis (PCA), Support vector machine (SVM), Indicators o