To search, Click below search items.
All Published Papers Search Service
Title
Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds
Author
Ehtsham Irshad and Abdul Basit Siddiqui
Vol. 24 No. 4 pp. 179-191
Keywords
Cyber-threat intelligence (CTI), Security Information and event management (SIEM), Intrusion detection system (IDS), Intrusion prevention system (IPS), Denial of service (DoS), Principal component analysis (PCA), Support vector machine (SVM), Indicators o
A DDoS attack Mitigation in IoT Communications Using Machine Learning
Hailye Tekleselase
Vol. 24 No. 4 pp. 170-178
Distributed denial of Service; wireless networks; Machine Learning Algorithms; Transmission Control Protocol; CNN; network security
Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India
Simmi Chawla, Parul Tomar, and Sapna Gambhir
Vol. 24 No. 4 pp. 163-169
Internet of Things, STEM education, Low cost, effective learning, Node-Red, Raspberry pi, Python
Network Security Practices through Anonymity
Prof. Smitha G R, Suprith C Shekar, Ujwal Mirji
Vol. 24 No. 4 pp. 155-162
Online privacy, Anonymity, Networks, Virtual Private Networks, Onion Routing, spoofing