Results for 'network security'

979 found
Order:
  1. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  73
    Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  39
    Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  71
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  54
    Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  32
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  23
    Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  33
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference between channel capacity of main (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  62
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  51
    Deep Neural Networks for Real-Time Plant Disease Diagnosis and Productivity Optimization.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):645-652.
    The health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  18.  36
    Anonymization and Revocation of CP-ABE Based Ring Networks.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (5):1-15.
    given the increasing threats to data confidentiality and integrity. The project titled "Anonymization and Revocation of User Identity in CPABE-Based Ring Networks" addresses these concerns by integrating CiphertextPolicy Attribute-Based Encryption (CPABE) into a ring network environment. This novel approach effectively hides user identities during communications, mitigating risks of unauthorized data access and preventing potential misuse of sensitive information. A key feature of this project is the implementation of a secure revocation mechanism that ensures once a user's permissions are revoked, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  74
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with Signature-Based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation.Sally Serena Ramage - 2010 - Current Criminal Law 2 (3):2-7.
    Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation Pages 2-7 Current Criminal Law ISSN 1758-8405 Volume 2 Issue 3 March 2010 Author SALLY RAMAGE WIPO 900614 UK TM 2401827 USA TM 3,440.910 Orchid ID 0000-0002-8854-4293 Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Publisher & Managing Editor, Criminal Lawyer series [1980-2022](ISSN 2049-8047); Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  64
    Centralized Information Security Log-Collection facility.Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    This paper extensively develops and thoroughly creates a highly centralized and extremely efficient log collection system utilizing and leveraging the robust syslog server and comprehensively collects and gathers log data from the numerous hosts residing within the network, meticulously analyses and scrutinizes the detailed log files and promptly sends and transmits a critical alert message to the central host through secure and reliable SMS. This paper thoroughly and comprehensively addresses and tackles the increasingly growing and rapidly expanding need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Using the Existing CCTV Network for Crowd Management, Crime Prevention, and Work Monitoring using AIML.N. M. S. Desai - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-12.
    Closed-Circuit Television (CCTV) systems are essential in modern security setups because they provide continuous surveillance, acting as both a deterrent and a critical tool for monitoring and evidence collection. Unlike human guards who can be limited by fatigue and blind spots, CCTV cameras offer consistent, 24/7 coverage of key areas. They fill gaps in the current security system by enabling real-time monitoring and recording incidents for later review, ensuring that potential security breaches are detected and addressed more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Torture Pornopticon: (In)security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Power of Networks and Peer Pressure: An analysis of Slum Sanitation Program in Mumbai.Vivek Anand Asokan - 2017 - International Journal Sustainable Future for Human Security 5 (2):11-20.
    With the advent of the “Clean India” campaign in India, a renewed focus on cleanliness has started, with a special focus on sanitation. There have been efforts in the past to provide sanitation related services. However, there were several challenges in provisioning. Provision of sanitation is a public health imperative given increased instances of antimicrobial resistance in India. This paper focuses on sanitation provisioning in the city of Mumbai, especially in the slums of Mumbai. The paper compares and contrasts different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  54
    Fake Profile Detection on Social Networking Websites using Machine Learning.R. T. Subhalakshmi - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-18.
    With the increasing popularity of social networking websites, the problem of fake profiles has become a significant concern. Fake profiles, often created by malicious actors for fraudulent purposes, pose threats to user privacy, security, and trustworthiness of online platforms. This project proposes a machine learning-based approach to detect fake profiles on social networking websites. By analyzing various features such as user activity patterns, profile attributes, and network connections, the model identifies potential fake profiles with high accuracy. The system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Holding “free and unfair elections”: the electoral containment strategies used by incumbent political parties in Albania to secure their grip on power.Gerti Sqapi & Klementin Mile - 2022 - Jus and Justicia 16 (1):78-92.
    The purpose of this article is to highlight the clientelistic strategies and informal practices that the ruling political parties in Albania use during the elections to ensure an unfair advantage in their favour over the opposition challengers. One of the main characteristics of the political developments of the transition period in Albania since 1991 has been the flourishing of informal practices and clientelist networks of political parties within state structures, which has produced an extreme politicization of these institutions. These strategies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...) of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Sentiment analysis on online social network.Vijaya Abhinandan - forthcoming - International Journal of Computer Science, Information Technology, and Security.
    A large amount of data is maintained in every Social networking sites.The total data constantly gathered on these sites make it difficult for methods like use of field agents, clipping services and ad-hoc research to maintain social media data. This paper discusses the previous research on sentiment analysis.
    Download  
     
    Export citation  
     
    Bookmark  
  34.  2
    Web/Mobile Based Tool for Mapping of Water Supply Network.Vaman Dasu - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-12.
    issues in real-time, allowing authorities to address concerns swiftly. Additionally, the integration of IoT-based monitoring, utilizing ESP32/ARDUINO devices, will enable the collection of real-time data, providing alerts on water supply status and system malfunctions. The technology stack comprises JavaScript, PHP, and PostgreSQL with PostGIS for spatial data management, emphasizing secure, scalable data handling. The platform is designed for continuous improvement through user feedback, ensuring it evolves to meet the dynamic needs of the Jal Jeevan Mission. Through innovative technology and a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  45
    Efficient Enumeration of URLs of Active Hidden Servers over Anonymous Channel.S. Cherishma Sree - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-14.
    This project presents an innovative approach to the efficient enumeration of hidden service URLs (.onion) on the TOR network using a custom-built graphical user interface (GUI) application. The tool leverages web scraping techniques, targeting the Ahmia search engine, to retrieve and analyze active hidden server URLs. Through the integration of Python’s Tkinter library for GUI development and the use of requests and regular expressions for content mining, the application simplifies the process of discovering and visualizing .onion URLs. The tool (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Vectors of epistemic insecurity.Emily Sullivan & Mark Alfano - 2020 - In Ian James Kidd, Quassim Cassam & Heather Battaly (eds.), Vice Epistemology. New York, NY: Routledge.
    Epistemologists have addressed a variety of modal epistemic standings, such as sensitivity, safety, risk, and epistemic virtue. These concepts mark out the ways that beliefs can fail to track the truth, articulate the conditions needed for knowledge, and indicate ways to become a better epistemic agent. However, it is our contention that current ways of carving up epistemic modality ignore the complexities that emerge when individuals are embedded within a community and listening to a variety of sources, some of whom (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Policing Uncertainty: On Suspicious Activity Reporting.Meg Stalcup - 2015 - In Rabinow Simimian-Darash (ed.), Modes of Uncertainty: Anthropological Cases. University of Chicago. pp. 69-87.
    A number of the men who would become the 9/11 hijackers were stopped for minor traffic violations. They were pulled over by police officers for speeding or caught by random inspection without a driver’s license. For United States government commissions and the press, these brushes with the law were missed opportunities. For some police officers though, they were of personal and professional significance. These officers replayed the incidents of contact with the 19 men, which lay bare the uncertainty of every (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  20
    Distributed Denial of Service Protection.T. Shyam Prasad - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (6):1-14.
    As Distributed Denial of Service (DDoS) attacks evolve, accurately detecting these threats becomes essential to ensuring network stability. Traditional methods often face challenges in recognizing adaptive DDoS patterns and balancing detection accuracy with false positives. This paper presents a machine learning-based framework leveraging Gaussian Naive Bayes, K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and an Ensemble Random Forest classifier. Through an in-depth performance analysis using accuracy and AUC-ROC metrics, the hybrid model aims to provide a robust, scalable solution to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  60
    A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Shielding the Cloud: _A Survey of Different DDoS Detection Techniques (13th edition).Kruthika B. Anil Kumar, , Lavanya G. S. - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (10):17762-17766. Translated by Lavanya G S Anil Kumar.
    Security is a major concern on the internet, and Distributed Denial of Service (DDoS) attacks are a significant threat. These attacks overwhelm network resources and use up bandwidth, making it difficult for legitimate users to access services. One challenge in dealing with DDoS attacks is telling the difference between a sudden increase in traffic from real users, known as a "flash crowd," and actual attack traffic. This paper looks at different existing solutions for detecting DDoS attacks and explains (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Family and community inputs as predictors of students’ overall, cognitive, affective and psychomotor learning outcomes in secondary schools.John Asuquo Ekpenyong, Valentine Joseph Owan, Usen Friday Mbon & Stephen Bepeh Undie - 2023 - Journal of Pedagogical Research 7 (1):103-127.
    There are contradictory results regarding how students' learning outcomes can be predicted by various family and community inputs among previous studies, creating an evidence gap. Furthermore, previous studies have mostly concentrated on the cognitive aspect of students' learning outcomes, ignoring the affective and psychomotor dimensions, creating key knowledge gaps. Bridging these gaps, this predictive correlational study was conducted to understand how cultural capital, parental involvement (family inputs), support for schools, security network and school reforms (community inputs) jointly and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  82
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Stakeholders’ Evaluation of a Farmer-Herder Conflict Research Project in the Ashanti Region of Ghana.Suhiyini Alhassan - 2024 - Sustainable Agriculture Research 13 (2):84-100.
    There has been growing interest in the evaluation of research projects in Africa because of the quantum of funding devoted to research by governmental and non-governmental organizations. One area that has received a lot of research funding is farmer-herder conflicts due to its high impact on peace, security and development on the continent. This paper evaluates a Danida-funded research project in the Ashanti Region of Ghana dubbed “Access-Authority Nexus in Farmer-Herder Conflicts (AAN Project)”. Primary data was collected from 46 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  45.  46
    Automated Plant Disease Detection through Deep Learning for Enhanced Agricultural Productivity.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):640-650.
    he health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  76
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  67
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Compound Metric Assisted Trust Aware Routing for Internet of Things through Firefly Algorithm.Mohammad Osman, Kaleem Fatima & P. Naveen Kumar - 2023 - International Journal of Intelligent Engineering and Systems 16 (3):280-291.
    Security and privacy are the major concerns in the internet of things (IoT) which are uncertain and unpredictable. Trust aware routing is one of the recent and effective strategies which ensure better resilience for IoT nodes from different security threats. Towards such concern, this paper proposes a new strategy called independent onlooker withstanding trust aware routing (IOWTAR) for IoT. IOWTAR introduced a new compound trust metric by combining three individual metrics namely independent trust, onlooker trust, and withstanding trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Modern Origins & Sources of China’s Techtransfer.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):18-25.
    The research identified the key element on P. R. China’s incentives in modern history on techtransfer practices. With reviewing on the state funding surrogacy in the natural sciences, the author identified the key militant coercive contracting clauses in the document of the National Natural Science Foundation of China. With its combined workings with the statutory & martial laws, the analysis takes a com- parative culture approach that partially counteracts the work of the “United Front Working Group of the CPC”, which (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. Single Valued Neutrosophic HyperSoft Set based on VIKOR Method for 5G Architecture Selection.Florentin Smarandache, M. Ali Ahmed & Ahmed Abdelhafeez - 2024 - International Journal of Neutrosophic Science 23 (2):42-52.
    This work introduces the framework for selecting architecture in 5G networks, considering various technological, performance, economic, and operational factors. With the emergence of 5G technology, the architecture selection process has become pivotal in meeting diverse requirements for ultra-high-speed connectivity, low latency, scalability, and diverse service demands. The evaluation comprehensively analyses different architecture options, including centralized, distributed, cloud-based, and virtualized architectures. Factors such as network performance, scalability, cost-effectiveness, security, and compatibility are considered within a multi-criteria decision-making framework. Findings reveal (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 979