International Journal of Pervasive Computing and Communications: Volume 19 Issue 5
Table of contents
Network traffic analysis through deep learning for detection of an army of bots in health IoT network
Geetha K., Brahmananda S.H.IoT has a wide range of applications in the health-care sector and has captured the interest of many academic and industrial communities. The health IoT devices suffer from botnet…
An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network
Mythili Boopathi, Meena Chavan, Jeneetha Jebanazer J., Sanjay Nakharu Prasad KumarThe Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that…
Real-time optimal protocol prediction of quantum key distribution using machine learning
Arthi R., Nayana J.S., Rajarshee MondalThe purpose of optimal protocol prediction and the benefits offered by quantum key distribution (QKD), including unbreakable security, there is a growing interest in the practical…
Performance analysis of a cloud-based network analytics system with multiple-source data aggregation
Tulsi Pawan Fowdur, Lavesh BabooramThe purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to classify…
Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators
Souad El Houssaini, Mohammed-Alamine El Houssaini, Jamal El KafiIn vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly…
A load-balanced hybrid heuristic for allocation of batch of tasks in cloud computing environment
Sophiya Shiekh, Mohammad Shahid, Manas Sambare, Raza Abbas Haidri, Dileep Kumar YadavCloud computing gives several on-demand infrastructural services by dynamically pooling heterogeneous resources to cater to users’ applications. The task scheduling needs to be…
Source location privacy preservation in IoT-enabled event-driven WSNs
Nidhi Sharma, Ravindara BhattPrivacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system…
Optimized security algorithm for connected vehicular network
Deepak ChoudharyAs the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…
ISSN:
1742-7371e-ISSN:
1742-738XISSN-L:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Seng Loke