Search
Now showing items 1-10 of 17
GRAY HOLE ATTACK ON HYBRID 5G NETWORK
(International Journal of Advanced Research in Computer Science, 2017)
5G device to device communication is such a product of progressive thinking, a network that uses both LTE communication scenario in conjugation with Wi-Fi low band communication. The main idea for conjunction of two different ...
Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the-Middle Attack in WLAN
(Modern Education and Computer Science Press, 2016)
The use of wireless devices is increasing tremendously in our day-to-day life because of their portability and ease of deployment. The augmented practices of using these technologies have put the user security at risk. The ...
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
(Modern Education and Computer Science Press, 2016)
Fast-flux service networks (FFSN) helps the cyber-criminals to hide the servers used for malicious activities behind a wall of proxies (bots). It provides the reliability and detection evasion to a malicious server. FFSN ...
Recovery Based Architecture To Protect Hids Log Files Using Time Stamps
(ACADEMY PUBLISHER, 2010)
After the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions
in ...
SHED: Spam Ham Email Dataset
(International Journal on Recent and Innovation Trends in Computing and Communication (, 2017)
Automatic filtering of spam emails becomes essential feature for a good email service provider. To gain direct or indirect benefits organizations/individuals are sending a lot of spam emails. Such kind emails activities ...
SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter
(Publishing India, 2014)
The massive adoption of cloud computing by IT industry has caused a dramatic increase in energy consumption and its impact on the environment in terms of carbon footprints. The high cost of energy and link between energy ...
Handover between Wi-Fi and WiMAX technologies using GRE tunnel
(Springer, 2019)
The next era of wireless grid inclines to be heterogeneous in the composition, i.e., wireless technologies like Wi-Fi and WiMAX networks desire co-breathe, so there is a demand for the best utilization of the accessible ...
UrduDeepNet: offline handwritten Urdu character recognition using deep neural network
(Springer Science and Business Media Deutschland GmbH, 2021-06-07)
Handwritten Urdu character recognition system faces several challenges including the writer-dependent variations and non-availability of benchmark databases for cursive writing scripts. In this study, we propose a handwritten ...
CottonLeafNet: cotton plant leaf disease detection using deep neural networks
(Springer, 2023-03-18)
India is a cover crop region whereby agricultural production sustains a substantial proportion of the populace and upon which the whole Indian economy is heavily reliant. As per research, it provides subsistence for around ...
OG-CAT: A Novel Algorithmic Trading Alternative to Investment in Crypto Market
(Springer, 2023-03-28)
Cryptocurrencies have emerged as a good tool for investment/trading in the last decade. The investors have achieved promising gains with the long-term investments made at reasonably good price/time. However, investment in ...