Results for 'Security network'

978 found
Order:
  1.  83
    Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  61
    Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  12
    Microsoft Azure Networking: Empowering Cloud Connectivity and Security.Borra Praveen - 2024 - International Journal of Advanced Research in Science, Communication and Technology 4 (3):469-475.
    In the current era dominated by cloud computing, networking infrastructure serves as the backbone of digital operations. Among the top cloud service providers, Microsoft Azure offers a robust suite of networking solutions tailored to meet the evolving needs of modern businesses. This document aims to provide a comprehensive overview of Azure networking, examining its key components, deployment models, best practices, and practical applications. By exploring Azure Virtual Network, Load Balancer, VPN Gateway, ExpressRoute, Firewall, and other services in detail, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  43
    Advancements in AI-Driven Communication Systems: Enhancing Efficiency and Security in Next-Generation Networks (13th edition).Palakurti Naga Ramesh - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (1):28-36.
    The increasing complexity and demands of next-generation networks necessitate the integration of Artificial Intelligence (AI) to enhance their efficiency and security. This article explores advancements in AI-driven communication systems, focusing on optimizing network performance, ensuring robust security measures, and addressing the challenges of scalability and real-time adaptability. By analyzing case studies, emerging technologies, and recent research, this study highlights AI's transformative potential in redefining communication systems for future applications.
    Download  
     
    Export citation  
     
    Bookmark  
  7.  34
    Secure Verification Technique for Defending IP Spoofing Attacks (13th edition).Sugumar R. - 2016 - International Arab Journal of Information Technology 13 (2):302-309.
    The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authenticates IP address of each Autonomous System (AS) using Neighbour Authentication (NA) algorithm. The algorithm works by validating NA (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  43
    Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  83
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  42
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks (14th edition).Sugumar R. - 2024 - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 14 (2):66-81.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  84
    Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  89
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  58
    Anonymization and Revocation of CP-ABE Based Ring Networks.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (5):1-15.
    given the increasing threats to data confidentiality and integrity. The project titled "Anonymization and Revocation of User Identity in CPABE-Based Ring Networks" addresses these concerns by integrating CiphertextPolicy Attribute-Based Encryption (CPABE) into a ring network environment. This novel approach effectively hides user identities during communications, mitigating risks of unauthorized data access and preventing potential misuse of sensitive information. A key feature of this project is the implementation of a secure revocation mechanism that ensures once a user's permissions are revoked, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  42
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference between channel capacity of main (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  19.  17
    Network Intrusion Classification.O. Sri Nagesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    The rapid proliferation of interconnected devices and the increasing complexity of digital networks in the modern era have resulted in a surge of diverse and voluminous network traffic. This growth poses considerable challenges in effectively distinguishing between normal and malicious data flows. As cyber threats continue to evolve, traditional traffic classification methods struggle to keep pace with the dynamic and multifaceted security challenges of contemporary networks. In this context, ensuring robust network security has become an imperative. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  59
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  24
    Trust based authentication technique for cluster based vehicular ad hoc networks (VANET).Sugumar R. - 2016 - Journal of Mobile Communication, Computation and Information 10 (6):1-10.
    Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  47
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks.DrV. R. Vimal and DrR. Sugumar DrR. Udayakumar, Dr Suvarna Yogesh Pansambal, Dr Yogesh Manohar Gajmal - 2023 - INDIA: ESS- ESS PUBLICATION.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  80
    Centralized Information Security Log-Collection facility.Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    This paper extensively develops and thoroughly creates a highly centralized and extremely efficient log collection system utilizing and leveraging the robust syslog server and comprehensively collects and gathers log data from the numerous hosts residing within the network, meticulously analyses and scrutinizes the detailed log files and promptly sends and transmits a critical alert message to the central host through secure and reliable SMS. This paper thoroughly and comprehensively addresses and tackles the increasingly growing and rapidly expanding need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Using the Existing CCTV Network for Crowd Management, Crime Prevention, and Work Monitoring using AIML.N. M. S. Desai - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-12.
    Closed-Circuit Television (CCTV) systems are essential in modern security setups because they provide continuous surveillance, acting as both a deterrent and a critical tool for monitoring and evidence collection. Unlike human guards who can be limited by fatigue and blind spots, CCTV cameras offer consistent, 24/7 coverage of key areas. They fill gaps in the current security system by enabling real-time monitoring and recording incidents for later review, ensuring that potential security breaches are detected and addressed more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):138-157.
    Given the growing dependence on digital systems and the escalation of financial fraud occurrences, it is imperative to implement efficient cyber security protocols and fraud detection methodologies. The threat's dynamic nature often challenges conventional methods, necessitating the adoption of more sophisticated strategies. Individuals depend on pre-established regulations or problem-solving processes, which possess constraints in identifying novel and intricate fraudulent trends. Conventional techniques need help handling noise data and the substantial expenses incurred by false positives and true positives. To tackle (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  67
    Deep Neural Networks for Real-Time Plant Disease Diagnosis and Productivity Optimization.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):645-652.
    The health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  31
    Trust based authentication technique for cluster based _vehicular ad hoc networks (VANET).Sugumar R. - 2016 - Journal of Mobile Communication, Computation and Information 10 (6):1-10. Translated by Sugumar R..
    Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  90
    Fake Profile Detection on Social Networking Websites using Machine Learning.R. T. Subhalakshmi - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-18.
    With the increasing popularity of social networking websites, the problem of fake profiles has become a significant concern. Fake profiles, often created by malicious actors for fraudulent purposes, pose threats to user privacy, security, and trustworthiness of online platforms. This project proposes a machine learning-based approach to detect fake profiles on social networking websites. By analyzing various features such as user activity patterns, profile attributes, and network connections, the model identifies potential fake profiles with high accuracy. The system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Power of Networks and Peer Pressure: An analysis of Slum Sanitation Program in Mumbai.Vivek Anand Asokan - 2017 - International Journal Sustainable Future for Human Security 5 (2):11-20.
    With the advent of the “Clean India” campaign in India, a renewed focus on cleanliness has started, with a special focus on sanitation. There have been efforts in the past to provide sanitation related services. However, there were several challenges in provisioning. Provision of sanitation is a public health imperative given increased instances of antimicrobial resistance in India. This paper focuses on sanitation provisioning in the city of Mumbai, especially in the slums of Mumbai. The paper compares and contrasts different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  39
    Integrating Ensemble _Deep Learning Models for Cybersecurity in Cloud Network Forensics (12th edition).B. Menaka Dr S. Arulselvarani, - 2024 - International Journal of Multidisciplinary and Scientific Emerging Research 12 (4):2653-2606. Translated by Dr. S. Arulselvarani.
    To evaluate the effectiveness of our approach to enhancing cloud computing network forensics by integrating deep learning techniques with cybersecurity policies. With the increasing complexity and volume of cyber threats targeting cloud environments, traditional forensic methods are becoming inadequate. Deep learning techniques offer promising solutions for analyzing vast amounts of network data and detecting anomalies indicative of security breaches. By integrating deep learning models with cybersecurity policies, organizations can achieve enhanced threat detection, rapid response times, and improved (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Torture Pornopticon: (In)security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Holding “free and unfair elections”: the electoral containment strategies used by incumbent political parties in Albania to secure their grip on power.Gerti Sqapi & Klementin Mile - 2022 - Jus and Justicia 16 (1):78-92.
    The purpose of this article is to highlight the clientelistic strategies and informal practices that the ruling political parties in Albania use during the elections to ensure an unfair advantage in their favour over the opposition challengers. One of the main characteristics of the political developments of the transition period in Albania since 1991 has been the flourishing of informal practices and clientelist networks of political parties within state structures, which has produced an extreme politicization of these institutions. These strategies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  86
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with Signature-Based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation.Sally Serena Ramage - 2010 - Current Criminal Law 2 (3):2-7.
    Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation Pages 2-7 Current Criminal Law ISSN 1758-8405 Volume 2 Issue 3 March 2010 Author SALLY RAMAGE WIPO 900614 UK TM 2401827 USA TM 3,440.910 Orchid ID 0000-0002-8854-4293 Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Publisher & Managing Editor, Criminal Lawyer series [1980-2022](ISSN 2049-8047); Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Family and community inputs as predictors of students’ overall, cognitive, affective and psychomotor learning outcomes in secondary schools.John Asuquo Ekpenyong, Valentine Joseph Owan, Usen Friday Mbon & Stephen Bepeh Undie - 2023 - Journal of Pedagogical Research 7 (1):103-127.
    There are contradictory results regarding how students' learning outcomes can be predicted by various family and community inputs among previous studies, creating an evidence gap. Furthermore, previous studies have mostly concentrated on the cognitive aspect of students' learning outcomes, ignoring the affective and psychomotor dimensions, creating key knowledge gaps. Bridging these gaps, this predictive correlational study was conducted to understand how cultural capital, parental involvement (family inputs), support for schools, security network and school reforms (community inputs) jointly and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...) of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Sentiment analysis on online social network.Vijaya Abhinandan - forthcoming - International Journal of Computer Science, Information Technology, and Security.
    A large amount of data is maintained in every Social networking sites.The total data constantly gathered on these sites make it difficult for methods like use of field agents, clipping services and ad-hoc research to maintain social media data. This paper discusses the previous research on sentiment analysis.
    Download  
     
    Export citation  
     
    Bookmark  
  46.  43
    Web/Mobile Based Tool for Mapping of Water Supply Network.Vaman Dasu - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-12.
    issues in real-time, allowing authorities to address concerns swiftly. Additionally, the integration of IoT-based monitoring, utilizing ESP32/ARDUINO devices, will enable the collection of real-time data, providing alerts on water supply status and system malfunctions. The technology stack comprises JavaScript, PHP, and PostgreSQL with PostGIS for spatial data management, emphasizing secure, scalable data handling. The platform is designed for continuous improvement through user feedback, ensuring it evolves to meet the dynamic needs of the Jal Jeevan Mission. Through innovative technology and a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Improving Generative AI Models for Secure and Private Data Synthesis.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):210-215.
    Generative Adversarial Networks (GANs) have demonstrated significant potential in generating synthetic data for various applications, including those involving sensitive information like healthcare and finance. However, two major issues arise when GANs are applied to sensitive datasets: (i) the model may memorize training samples, compromising the privacy of individuals, especially when the data includes personally identifiable information (PII), and (ii) there is a lack of control over the specificity of the generated samples, which limits their utility for tailored use-cases. To address (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  80
    A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  30
    Shielding the Cloud: _A Survey of Different DDoS Detection Techniques (13th edition).Kruthika B. Anil Kumar, , Lavanya G. S. - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (10):17762-17766. Translated by Lavanya G S Anil Kumar.
    Security is a major concern on the internet, and Distributed Denial of Service (DDoS) attacks are a significant threat. These attacks overwhelm network resources and use up bandwidth, making it difficult for legitimate users to access services. One challenge in dealing with DDoS attacks is telling the difference between a sudden increase in traffic from real users, known as a "flash crowd," and actual attack traffic. This paper looks at different existing solutions for detecting DDoS attacks and explains (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Policing Uncertainty: On Suspicious Activity Reporting.Meg Stalcup - 2015 - In Rabinow Simimian-Darash (ed.), Modes of Uncertainty: Anthropological Cases. University of Chicago. pp. 69-87.
    A number of the men who would become the 9/11 hijackers were stopped for minor traffic violations. They were pulled over by police officers for speeding or caught by random inspection without a driver’s license. For United States government commissions and the press, these brushes with the law were missed opportunities. For some police officers though, they were of personal and professional significance. These officers replayed the incidents of contact with the 19 men, which lay bare the uncertainty of every (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 978