PROPOSED COMPREHENSIVE EAVESDROPPING DETECTION SOLUTION IN MULTI-VLAN SWITCHED NETWORK BASED ON IPFIX FLOW
Viet H. Le, Huy-Trung Nguyen, Cuong V. Trinh and Tran Minh Hieu Department of Cybersecurity and High-Tech Crime Prevention,People’s Security Academy, Hanoi, Vietnam Research Institute of Posts and Telecommunications, Data … Continue reading
IJCNC 04
Enhancing Manet Security Through Blockchain-Driven Multipath Route Authentication Gagan Bhatt, Krishna Kaniyal, Jayant Pal and Jogendra Kumar, GBPIET Ghurdauri Pauri Garhwal Uttarakhand, India ABSTRACT Mobile Ad-hoc Networks (MANETs) are wireless … Continue reading
IJNSA 03
Database and System Security Nikitha Merilena Jonnada, University of the Cumberlands, USA ABSTRACT Database and system security are critical components in modern information technology, underpinning the reliability and trustworthiness of … Continue reading
AN EXPLAINABLE GRAPH NEURAL NETWORK FRAMEWORK FOR ANTI–MONEY LAUNDERING IN CRYPTOCURRENCY TRANSACTIONS USING THE ELLIPTIC DATASET
Oluwatosin Lawal 1 , Awele Okolie 2 , Callistus Obunadike 3 1 Department of Mathematics Statistical Analytics, Computing and Modeling, Texas A&M University, Kingsville, USA 2 School of Computing and … Continue reading
IJCNC 03
RLSUAV: RELATIVE LOCALIZATION IN A SWARM OF UAVS Sara Benkouider, Nasreddine Lagraa, and Mohamed Bachir YagoubiLaboratoire d’Informatique et de Mathématiques, Université Amar Telidji de Laghouat,Laghouat, Algeria ABSTRACT A swarm or … Continue reading
IJNSA 04
A Novel Trust-based DDOS Cyberattack Detection Model for Smart Business Environments Oghenetejiri Okporokpo, Funminiyi Olajide, Nemitari Ajienka and Xiaoqi MaDepartment of Computer Science, Nottingham Trent University, Clifton Lane,Nottingham NG11 8NS, … Continue reading
HYBRID ANOMALY DETECTION MECHANISM FORIOT NETWORKS
Harish Kumar Saini, Monika Poriye Department of Computer Science and Applications, Kurukshetra University, India ABSTRACTThe Internet of Things (IoT) is the fastest-growing collection of physical entities embedded with technologies to … Continue reading
IJCNC 08
ENHANCING DISTRIBUTED AUTHORIZATION WITHLAGRANGE INTERPOLATION AND ATTRIBUTEBASED ENCRYPTION Keshav Sinha 1 , Sumitra 1 , Richa Kumari 1 , Akashdeep Bhardwaj 1 and Shawon Rahman 21Centre for Cybersecurity, School of … Continue reading
IJNSA 01
HYPERPARAMETER TUNING-BASED OPTIMIZED PERFORMANCE ANALYSIS OFMACHINE LEARNING ALGORITHMS FOR NETWORK INTRUSION DETECTION Sudhanshu Sekhar Tripathy and Bichitrananda BeheraDepartment of Computer Science and Engineering, C.V. Raman Global University,Bhubaneswar, Odisha, India ABSTRACT … Continue reading
IJCNC 01
Deep Reinforcement Learning-Based Resource Allocation in Massive MIMO NOMA Systems Pham Hoai An1, 2, Nguyen Dung1, 2, Nguyen Thi Xuan Uyen1, 2, Nguyen Thai Cong Nghia1, 2, Ngo Minh Nghia1, … Continue reading