Results for ' Cybersecurity, Network Engineering, Network Segmentation, Firewalls, Vulnerability Assessment, Network Monitoring'

984 found
Order:
  1.  5
    Cybersecurity and Network Engineering: Bridging the Gap for Optimal Protection.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (4):2701-2706.
    : In the digital age, cybersecurity and network engineering are two integral disciplines that must operate in unison to safeguard information and ensure the resilience of modern systems. While network engineering focuses on designing, implementing, and maintaining infrastructure, cybersecurity emphasizes protecting this infrastructure and its data from threats. This research explores the intricate relationship between these domains, advocating for a unified approach to achieve optimal protection in an increasingly interconnected world. The study highlights the evolving threat landscape characterized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  47
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure (...) infrastructure. Network segmentation focuses on dividing large networks into smaller, more manageable subnetworks. This process enforces boundaries between different areas of a network, reducing exposure and protecting sensitive data. Meanwhile, microsegmentation extends this concept to the individual workload level, offering granular security controls that adapt to dynamic and cloud-based environments. These approaches are particularly relevant in today's context, where hybrid infrastructures and multi-cloud deployments are becoming the norm, posing significant security challenges. The paper examines the technical underpinnings of segmentation techniques, highlighting tools and frameworks that facilitate their deployment. It also addresses key challenges, such as the complexity of configuration, potential performance bottlenecks, and the necessity for alignment with broader organizational policies. Case studies from industries such as healthcare, finance, and government are analyzed to demonstrate the effectiveness of segmentation in reducing the scope and impact of cyberattacks. Additionally, this study delves into the evolving landscape of cyber threats, emphasizing the role of segmentation in countering advanced persistent threats (APTs), ransomware attacks, and insider threats. By adopting a zero-trust architecture that integrates micro-segmentation, organizations can ensure that every access request is verified and confined to the least privileged level necessary. This proactive approach to network defense aligns with industry best practices and regulatory standards, enhancing an organization's security posture. Furthermore, the research highlights the importance of continuous monitoring and automation in maintaining segmented networks. Emerging technologies such as artificial intelligence (AI) and machine learning (ML) are explored for their potential to optimize and simplify segmentation processes. These advancements enable organizations to dynamically adapt to evolving threats while maintaining operational efficiency. The findings emphasize that while network segmentation and micro-segmentation are not silver bullets, they represent indispensable layers of defense within a multi-faceted cybersecurity strategy. Organizations that successfully implement these strategies can significantly reduce the likelihood and impact of breaches, protect critical assets, and build resilience against future threats. This paper aims to provide a comprehensive guide for cybersecurity professionals, IT administrators, and policymakers to understand and adopt network segmentation and micro-segmentation. By integrating these strategies into their security frameworks, enterprises can fortify their defenses in the face of a constantly shifting threat landscape, safeguarding their infrastructure, data, and operations. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  5
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure (...) infrastructure. Network segmentation focuses on dividing large networks into smaller, more manageable subnetworks. This process enforces boundaries between different areas of a network, reducing exposure and protecting sensitive data. Meanwhile, microsegmentation extends this concept to the individual workload level, offering granular security controls that adapt to dynamic and cloud-based environments. These approaches are particularly relevant in today's context, where hybrid infrastructures and multi-cloud deployments are becoming the norm, posing significant security challenges. The paper examines the technical underpinnings of segmentation techniques, highlighting tools and frameworks that facilitate their deployment. It also addresses key challenges, such as the complexity of configuration, potential performance bottlenecks, and the necessity for alignment with broader organizational policies. Case studies from industries such as healthcare, finance, and government are analyzed to demonstrate the effectiveness of segmentation in reducing the scope and impact of cyberattacks. Additionally, this study delves into the evolving landscape of cyber threats, emphasizing the role of segmentation in countering advanced persistent threats (APTs), ransomware attacks, and insider threats. By adopting a zero-trust architecture that integrates micro-segmentation, organizations can ensure that every access request is verified and confined to the least privileged level necessary. This proactive approach to network defense aligns with industry best practices and regulatory standards, enhancing an organization's security posture. Furthermore, the research highlights the importance of continuous monitoring and automation in maintaining segmented networks. Emerging technologies such as artificial intelligence (AI) and machine learning (ML) are explored for their potential to optimize and simplify segmentation processes. These advancements enable organizations to dynamically adapt to evolving threats while maintaining operational efficiency. The findings emphasize that while network segmentation and micro-segmentation are not silver bullets, they represent indispensable layers of defense within a multi-faceted cybersecurity strategy. Organizations that successfully implement these strategies can significantly reduce the likelihood and impact of breaches, protect critical assets, and build resilience against future threats. This paper aims to provide a comprehensive guide for cybersecurity professionals, IT administrators, and policymakers to understand and adopt network segmentation and micro-segmentation. By integrating these strategies into their security frameworks, enterprises can fortify their defenses in the face of a constantly shifting threat landscape, safeguarding their infrastructure, data, and operations. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  6
    Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  52
    Cybersecurity Portal for Effective Management of Servers and Firewall.G. Balram, - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (7):1-15.
    Existing systems often lack a centralized platform for managing server and firewall operations, leading to fragmented oversight and delayed responses to cyber threats. This gap frequently results in increased vulnerabilities and operational inefficiencies within organizations. To address this issue, we propose the development of the Cybersecurity Portal, designed to provide real-time monitoring, predictive analytics, and streamlined resource allocation for server and firewall management. The portal will offer comprehensive insights into system performance, potential vulnerabilities, and proactive threat detection. By equipping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet (...)
    Download  
     
    Export citation  
     
    Bookmark   83 citations  
  7.  44
    Reliability Engineering in Cloud Computing: Strategies, Metrics, and Performance Assessment.Anand Karanveer - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (12):3451-3464.
    Cloud computing has transformed the nature of computation, sharing of information resources, and storage capabilities, including the flexibility to scale these resources for corporate use. Nevertheless, maintaining high reliability in cloud environments is still an issue that has not been solved because of factors such as Hardware failures, network interruptions/slowdowns and software vulnerabilities. This paper discusses several methods that can be employed in the reliability engineering of cloud computing, including fault tolerance, redundancy, monitoring and predictive maintenance. It also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  7
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing attacks, unpatched (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  71
    Design of Cybersecurity Smart Controller For Grid Connected Microgrid.Soma Abhiram - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-15.
    The research introduces to the design and implementation of the Cybersecurity Enabled Smart Controller for the grid connected microgrid which uses the combination of the Web technologies and the authentication mechanism which enables real time monitoring with help of the Dashboards built using Chart.js which is a framework of JavaScript. Due to the role and connection of the Microgrids with the critical infrastructure they are vulnerable to the cyber threats. This project leverages the use of HTML, CSS, JavaScript and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  16
    The Role of Zero Trust Architecture in Mitigating Emerging Cybersecurity Threats.Alugoju Narasimha Rao - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (12):20200-20208.
    The rapid growth of cloud computing has revolutionized data management, providing organizations with unmatched scalability and flexibility [1]. However, this digital transformation has also exposed critical vulnerabilities, especially in the face of increasingly sophisticated cyber threats [3]. As organizations migrate to cloud-based infrastructures, traditional security models are proving ineffective in safeguarding sensitive data. Zero Trust Architecture (ZTA) emerges as a proactive and robust security framework designed to address these challenges by enforcing strict access controls and verifying every request for access, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  45
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing efficiency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  4
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing efficiency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  45
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  11
    Automating Network Security with Ansible: A Guide to Secure Network Automation.Bellamkonda Srikanth - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (9):2722-2730.
    The increasing complexity of modern networks has amplified the challenges associated with ensuring robust and scalable security. With the rapid evolution of cyber threats, traditional methods of network security management are often inadequate, leading to inefficiencies and vulnerabilities. Automation has emerged as a transformative approach to streamline network operations, enhance security postures, and reduce the margin of human error. This study explores the integration of Ansible, a powerful open-source automation tool, into network security workflows to deliver a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  8
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computerand Communication Engineering 8 (7):2894-2902.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  25
    Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (1):344-347.
    The Internet of Things (IoT) is revolutionizing industries by connecting everyday objects to the internet, enabling improved functionality and convenience. However, the rapid adoption of IoT devices has raised significant cybersecurity concerns, as the vast number of connected devices presents new vulnerabilities that can be exploited by cybercriminals. These vulnerabilities are often the result of insecure device configurations, weak authentication mechanisms, and inadequate data protection. This paper explores the cybersecurity challenges associated with IoT, such as device security, network security, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  19
    Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (1):344-347.
    The Internet of Things (IoT) is revolutionizing industries by connecting everyday objects to the internet, enabling improved functionality and convenience. However, the rapid adoption of IoT devices has raised significant cybersecurity concerns, as the vast number of connected devices presents new vulnerabilities that can be exploited by cybercriminals. These vulnerabilities are often the result of insecure device configurations, weak authentication mechanisms, and inadequate data protection. This paper explores the cybersecurity challenges associated with IoT, such as device security, network security, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  7
    Application Security in the OSI Model: Protecting the Application Layer from Emerging Threats.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (5):8120-8126.
    The application layer of the Open Systems Interconnection (OSI) model plays a critical role in enabling end-user interaction with network services, making it a primary target for cybersecurity threats. This paper reviews contemporary research on securing the application layer, addressing emerging threats such as injection attacks, malware, phishing, and zero-day vulnerabilities. Key strategies, including secure development practices, application firewalls, cryptographic protocols, and user education, are explored to mitigate these risks. The challenges of an evolving threat landscape and resource constraints (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  29
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  20.  20
    Cybersecurity Risk Management in the Era of Remote Work and Cloud Computing.Dhivya K. - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1637-1641.
    The rise of remote work and the widespread adoption of cloud computing have transformed the digital landscape, providing organizations with flexibility and scalability. However, these advancements have also introduced new cybersecurity challenges. Traditional security frameworks, which focus on perimeter defenses, are increasingly inadequate in securing cloud-based environments and remote workforces. This paper explores the evolving landscape of cybersecurity risk management in the context of remote work and cloud computing. It investigates the unique risks associated with these technologies, such as data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  13
    Just-in-Time Access for Databases: Harnessing AI for Smarter, Safer Permissions.Attaluri Vivekchowdary - 2023 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 12 (4):4702-4712.
    In the evolving landscape of data security, traditional access control mechanisms often fall short in addressing dynamic and context-specific requirements. As data breaches become more sophisticated, organizations require more adaptive and intelligent access control strategies. This paper explores the integration of Artificial Intelligence (AI) into Just-in-Time (JIT) access control models to enhance database security. By leveraging AI, we aim to create adaptive, context-aware permission systems that grant access precisely when needed, reducing the attack surface and mitigating unauthorized access risks. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  13
    Zero-Day Vulnerabilities.Vaka Pavan Reddy - 2012 - International Journal of Innovative Research in Science, Engineering and Technology 1 (2):318-322.
    Zero-day vulnerabilities are critical security risks that exploit previously unknown flaws in software systems, making them difficult to detect and defend against. As such vulnerabilities are discovered by attackers before the software vendor is aware of them, they provide a significant advantage to malicious entities. The exploitation of zero-day vulnerabilities is a major concern for both individuals and organizations, as it can lead to unauthorized data access, loss of information, and compromised systems. This paper aims to explore the nature of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  80
    Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  6
    AI-Powered Phishing Detection: Protecting Enterprises from Advanced Social Engineering Attacks.Bellamkonda Srikanth - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (1):12-20.
    Phishing, a prevalent form of social engineering attack, continues to threaten enterprises by exploiting human vulnerabilities and targeting sensitive information. With the increasing sophistication of phishing schemes, traditional detection methods often fall short in identifying and mitigating these threats. As attackers employ advanced techniques, such as highly personalized spear-phishing emails and malicious links, enterprises require innovative solutions to safeguard their digital ecosystems. This research explores the application of artificial intelligence (AI) in enhancing phishing detection and response, with a specific focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  56
    Integrating Ensemble _Deep Learning Models for Cybersecurity in Cloud Network Forensics (12th edition).B. Menaka Dr S. Arulselvarani, - 2024 - International Journal of Multidisciplinary and Scientific Emerging Research 12 (4):2653-2606. Translated by Dr. S. Arulselvarani.
    To evaluate the effectiveness of our approach to enhancing cloud computing network forensics by integrating deep learning techniques with cybersecurity policies. With the increasing complexity and volume of cyber threats targeting cloud environments, traditional forensic methods are becoming inadequate. Deep learning techniques offer promising solutions for analyzing vast amounts of network data and detecting anomalies indicative of security breaches. By integrating deep learning models with cybersecurity policies, organizations can achieve enhanced threat detection, rapid response times, and improved overall (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  98
    Centralized Information Security Log-Collection facility.Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    This paper extensively develops and thoroughly creates a highly centralized and extremely efficient log collection system utilizing and leveraging the robust syslog server and comprehensively collects and gathers log data from the numerous hosts residing within the network, meticulously analyses and scrutinizes the detailed log files and promptly sends and transmits a critical alert message to the central host through secure and reliable SMS. This paper thoroughly and comprehensively addresses and tackles the increasingly growing and rapidly expanding need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Using the Existing CCTV Network for Crowd Management, Crime Prevention, and Work Monitoring using AIML.N. M. S. Desai - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-12.
    Closed-Circuit Television (CCTV) systems are essential in modern security setups because they provide continuous surveillance, acting as both a deterrent and a critical tool for monitoring and evidence collection. Unlike human guards who can be limited by fatigue and blind spots, CCTV cameras offer consistent, 24/7 coverage of key areas. They fill gaps in the current security system by enabling real-time monitoring and recording incidents for later review, ensuring that potential security breaches are detected and addressed more effectively. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Assessing Cybercrime Syndicates: Understanding ‘Black Axe’ Confraternity and Cybercriminal Networks in Business Email Compromise (BEC) Scams.Suleman Lazarus - 2024 - Public Sector Counter Fraud Journal 1 (14):24-26.
    Cybercrime is a global threat affecting both public and private sectors. Business email compromise (BEC) is one of the most advanced and lucrative forms of cybercrime, exploiting vulnerabilities in corporate email systems to facilitate unauthorised financial transactions. Organisations worldwide suffer substantial losses from these attacks. This article explores the connection between Black Axe and BEC scams, providing insights into how public sector organisations can better combat these sophisticated criminal networks.
    Download  
     
    Export citation  
     
    Bookmark  
  29.  44
    Trust based authentication technique for cluster based _vehicular ad hoc networks (VANET).Sugumar R. - 2016 - Journal of Mobile Communication, Computation and Information 10 (6):1-10. Translated by Sugumar R..
    Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is a (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  30.  53
    Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, behavioral analytics (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  57
    Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  75
    Entropy in Physics using my Universal Formula.Angelito Malicse - manuscript
    -/- 1. Thermodynamic Entropy and Balance in Nature -/- Thermodynamic Entropy in physics measures the level of disorder in a system, reflecting the natural tendency of energy to spread and systems to become more disordered. -/- Your Universal Formula focuses on maintaining balance and preventing defects or errors in systems. -/- Integration: -/- Increasing thermodynamic entropy (e.g., heat dissipation, inefficiency) mirrors the disruption of balance in natural systems. -/- Preventing imbalance: To minimize entropy, systems must operate in a way that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Neural Network-Based Water Quality Prediction.Mohammed Ashraf Al-Madhoun & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (9):25-31.
    Water quality assessment is critical for environmental sustainability and public health. This research employs neural networks to predict water quality, utilizing a dataset of 21 diverse features, including metals, chemicals, and biological indicators. With 8000 samples, our neural network model, consisting of four layers, achieved an impressive 94.22% accuracy with an average error of 0.031. Feature importance analysis revealed arsenic, perchlorate, cadmium, and others as pivotal factors in water quality prediction. This study offers a valuable contribution to enhancing water (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  34. Genetically engineered mosquitoes, Zika and other arboviruses, community engagement, costs, and patents: Ethical issues.Zahra Meghani & Christophe Boëte - 2018 - PLoS Neglected Tropical Diseases 7 (12).
    Genetically engineered (GE) insects, such as the GE OX513A Aedes aegypti mosquitoes, have been designed to suppress their wild-type populations so as to reduce the transmission of vector-borne diseases in humans. Apart from the ecological and epidemiological uncertainties associated with this approach, such biotechnological approaches may be used by individual governments or the global community of nations to avoid addressing the underlying structural, systemic causes of those infections... We discuss here key ethical questions raised by the use of GE mosquitoes, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  38
    Trust based authentication technique for cluster based vehicular ad hoc networks (VANET).Sugumar R. - 2016 - Journal of Mobile Communication, Computation and Information 10 (6):1-10.
    Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike traditional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. DESIGN AND IMPLEMENTATION OF SENSOR NODE FOR WIRELESS SENSORS NETWORK TO MONITOR HUMIDITY OF HIGH-TECH POLYHOUSE ENVIRONMENT.B. P. Ladgaonkar - 2011 - International Journal of Advances in Engineering and Technology 1 (3):1-11.
    Wireless Sensors Network is a novel field shows tremendous application potential. To monitor the environmental parameters of high-tech polyhouse the Wireless Sensors Network (WSN) is developed. The heart of this ubiquitous field is the Wireless Sensor Node. Moreover, the field of microcontroller based embedded technology is innovative and more reliable. Therefore, based on an embedded technology and the RF module Zigbee a wireless senor node is designed about highly promising AVR ATmega8L microcontroller and implemented for WSN development. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Precarious work and its complicit network.Chuanfei Chin - 2019 - Journal of Contemporary Asia 49.
    How does precarious work entail social vulnerabilities and moral complicities? Theorists of precarity pose two challenges for analysing labour conditions in Asia. Their first challenge is to distinguish the new kinds of social vulnerability which constitute precarious work. The second is to assign moral responsibility in the social network that produces vulnerability in depoliticised and morally detached ways. In this article, the social and normative dimensions of precarious work are connected through a conceptual investigation into how Singapore (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  39. Neural Network-Based Audit Risk Prediction: A Comprehensive Study.Saif al-Din Yusuf Al-Hayik & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):43-51.
    Abstract: This research focuses on utilizing Artificial Neural Networks (ANNs) to predict Audit Risk accurately, a critical aspect of ensuring financial system integrity and preventing fraud. Our dataset, gathered from Kaggle, comprises 18 diverse features, including financial and historical parameters, offering a comprehensive view of audit-related factors. These features encompass 'Sector_score,' 'PARA_A,' 'SCORE_A,' 'PARA_B,' 'SCORE_B,' 'TOTAL,' 'numbers,' 'marks,' 'Money_Value,' 'District,' 'Loss,' 'Loss_SCORE,' 'History,' 'History_score,' 'score,' and 'Risk,' with a total of 774 samples. Our proposed neural network architecture, consisting of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  40.  47
    The Future of Cybersecurity: Emerging Threats and Mitigation Strategies.Swapna V. Sneha P. - 2021 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 8 (12):1306-1312.
    As technology rapidly advances, the landscape of cybersecurity faces increasingly complex and evolving threats. This paper explores the future of cybersecurity, focusing on emerging threats and the corresponding mitigation strategies. Key threats include AI-driven attacks, ransomware evolution, quantum computing vulnerabilities, IoT security risks, cloud security challenges, and supply chain attacks. These threats have the potential to disrupt organizations and compromise sensitive data on an unprecedented scale. To address these challenges, the paper outlines effective mitigation strategies such as leveraging AI and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. MVi_Scorecard Guideline for Sub-National Community Network (SCN) on NRM.Narith Por - 2023 - Cambodia: My Village Organization.
    MVi is actively engaged with the Bounorng, Kouy, Stieng, Kreung, Prov, Laak, and Kavet communities in the provinces of Mondulkiri, Stung Treng, and Kratie. Over the years, MVi has implemented three strategic plans since 2006, focusing on supporting indigenous and rural communities in these three provinces. The strategic plan for the period 2023–2027 is designed to enhance the livelihoods and economic conditions of indigenous and vulnerable communities. This plan prioritizes four key areas: climate change, natural resource management, modern agriculture production (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was found that attackers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  8
    Depression Intensity Estimation via Social Media: A Deep Learning Approach.Mr Anurag Jaiswal Prajwal Dudhe - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (1):569-572.
    One of the most prevalent and disabling mental conditions that seriously influence society is stress and depression. The use of social networking to improve the detection of stress and depression may require automatic health monitoring systems. Sentiment analysis refers to the use of content mining and natural language processing techniques with the goal of identifying feelings or opinions. full of emotion Computing is the study and development of systems and equipment that can recognize, understand, process, and imitate human effects. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  77
    The Corporate Social Assessment: Making Public Purpose Pay.Michael Bennett - 2024 - Review of Social Economy 82 (1):147-175.
    Corporations can be powerful engines of economic prosperity, but also for the public good more broadly conceived. But they need to be properly incentivized to fulfil these missions. We propose an innovative plan called the Corporate Social Assessment (CSA). Every four years, a randomly selected Citizens’ Assembly will meet to decide a grading scheme for assessing companies’ conduct. At the end of the cycle, a professional assessment body will grade the companies and rank them. The ranking will be the basis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  30
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. Key performance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. REFLECTIVE AND DIALOGICAL APPROACHES IN ENGINEERING ETHICS EDUCATION.Lavinia Marin, Yousef Jalali, Alexandra Morrison & Cristina Voinea - 2025 - In Shannon Chance, Tom Børsen, Diana Adela Martin, Roland Tormey, Thomas Taro Lennerfors & Gunter Bombaerts, The Routledge international handbook of engineering ethics education. New York, NY: Routledge. pp. 441-458.
    This chapter addresses the challenges of implementing reflective thinking in engineering ethics education (EEE). It examines existing methods for teaching ethical reflection in EEE and argues that pedagogical activities aiming to foster ethical reflection need to be infused with dialogical interactions and, at a deeper level, informed by dialogism. Dialogism is understood as a relational approach to inquiry in which interactions between moral agents enable them to develop their own understandings through the process of finding shared meanings with the others (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  51
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Rapid initiative assessment for counter-IED investment.Charles Twardy, Ed Wright, Tod Levitt, Kathryn Laskey & Kellen Leister - 2009 - In Charles Twardy, Ed Wright, Tod Levitt, Kathryn Laskey & Kellen Leister, Proceedings of the Seventh Bayesian Applications Modeling Workshop.
    There is a need to rapidly assess the impact of new technology initiatives on the Counter Improvised Explosive Device battle in Iraq and Afghanistan. The immediate challenge is the need for rapid decisions, and a lack of engineering test data to support the assessment. The rapid assessment methodology exploits available information to build a probabilistic model that provides an explicit executable representation of the initiative’s likely impact. The model is used to provide a consistent, explicit, explanation to decision makers on (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 984