Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

A Study of Black Hole Attack Solutions
  • Language: en
  • Pages: 124

A Study of Black Hole Attack Solutions

  • Type: Book
  • -
  • Published: 2015-11-03
  • -
  • Publisher: Syngress

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sop...

A Machine-Learning Approach to Phishing Detection and Defense
  • Language: en
  • Pages: 101

A Machine-Learning Approach to Phishing Detection and Defense

  • Type: Book
  • -
  • Published: 2014-12-05
  • -
  • Publisher: Syngress

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks Help your business or organization avoid costly damage from phishing sources Gain insight into machine-learning strategies for facing a variety of information security threats

Comparative Study of Multiple Black Hole Attacks Solution Methods in Manet Using Aodv Routing Protocol
  • Language: en
  • Pages: 118

Comparative Study of Multiple Black Hole Attacks Solution Methods in Manet Using Aodv Routing Protocol

Mobile Wireless Ad Hoc Networks (MANET) is non-centralized wireless networks that can be formulated without the need for any pre-existing infrastructure in which each node can act as a router. It must discover its local neighbours and through them it will communicate to nodes that are out of its transmission range. Various features like open medium, dynamic topology, lack of clear lines of defence, makes MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing (AODV) is one of the best and popular routing algorithms. AODV is severely affected by well-known black hole attack in which a malicious node injects a faked route reply message that it has a fresh route to destin...

A Study of Black Hole Attack Solutions
  • Language: en

A Study of Black Hole Attack Solutions

  • Type: Book
  • -
  • Published: Unknown
  • -
  • Publisher: Unknown

None

Disruptive technologies in Computing and Communication Systems
  • Language: en
  • Pages: 459

Disruptive technologies in Computing and Communication Systems

  • Type: Book
  • -
  • Published: 2024-06-24
  • -
  • Publisher: CRC Press

The 1st International Conference on Disruptive Technologies in Computing and Communication Systems (ICDTCCS - 2023) has received overwhelming response on call for papers and over 119 papers from all over globe were received. We must appreciate the untiring contribution of the members of the organizing committee and Reviewers Board who worked hard to review the papers and finally a set of 69 technical papers were recommended for publication in the conference proceedings. We are grateful to the Chief Guest Prof Atul Negi, Dean – Hyderabad Central University, Guest of Honor Justice John S Spears -Professor University of West Los Angeles CA, and Keynote Speakers Prof A. Govardhan, Rector JNTU ...

Computer Security
  • Language: en
  • Pages: 290

Computer Security

This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The IOSec Workshop received 17 submissions from which 7 full papers were selected for presentation. They cover topics related to security architectures a...

Optical Soliton Communication Using Ultra-Short Pulses
  • Language: en
  • Pages: 51

Optical Soliton Communication Using Ultra-Short Pulses

  • Type: Book
  • -
  • Published: 2015-05-07
  • -
  • Publisher: Springer

This brief analyzes the characteristics of a microring resonator (MRR) to perform communication using ultra-short soliton pulses. The raising of nonlinear refractive indices, coupling coefficients and radius of the single microring resonator leads to decrease in input power and round trips wherein the bifurcation occurs. As a result, bifurcation or chaos behaviors are seen at lower input power of 44 W, where the nonlinear refractive index is n2=3.2×10−20 m2/W. Using a decimal convertor system, these ultra-short signals can be converted into quantum information. Results show that multi solitons with FWHM and FSR of 10 pm and 600 pm can be generated respectively. The multi optical soliton with FWHM and FSR of 325 pm and 880 nm can be incorporated with a time division multiple access (TDMA) system wherein the transportation of quantum information is performed.

Frontiers of Quality Electronic Design (QED)
  • Language: en
  • Pages: 690

Frontiers of Quality Electronic Design (QED)

Quality Electronic Design (QED)’s landscape spans a vast region where territories of many participating disciplines and technologies overlap. This book explores the latest trends in several key topics related to quality electronic design, with emphasis on Hardware Security, Cybersecurity, Machine Learning, and application of Artificial Intelligence (AI). The book includes topics in nonvolatile memories (NVM), Internet of Things (IoT), FPGA, and Neural Networks.

Machine Learning in Image Analysis and Pattern Recognition
  • Language: en
  • Pages: 112

Machine Learning in Image Analysis and Pattern Recognition

  • Type: Book
  • -
  • Published: 2021-09-08
  • -
  • Publisher: MDPI

This book is to chart the progress in applying machine learning, including deep learning, to a broad range of image analysis and pattern recognition problems and applications. In this book, we have assembled original research articles making unique contributions to the theory, methodology and applications of machine learning in image analysis and pattern recognition.

Intelligent Secure Trustable Things
  • Language: en
  • Pages: 446

Intelligent Secure Trustable Things

None