Zobrazeno 1 - 10
of 2 573
pro vyhledávání: '"Gupta, B. B"'
Autor:
Yadav, Krishna, Gupta, B. B
In recent times, federated machine learning has been very useful in building intelligent intrusion detection systems for IoT devices. As IoT devices are equipped with a security architecture vulnerable to various attacks, these security loopholes may
Externí odkaz:
http://arxiv.org/abs/2102.10799
Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people's lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inv
Externí odkaz:
http://arxiv.org/abs/1705.09819
In this paper, we describe ongoing work that focuses on improving the strength of the answers to security questions. The ultimate goal of the proposed research is to evaluate the possibility of nudging users towards strong answers for ubiquitous secu
Externí odkaz:
http://arxiv.org/abs/1701.03229
Autor:
Gupta, B. B.1,2 (AUTHOR) bbgupta@nitkkr.ac.in, Prajapati, Varun1 (AUTHOR), Nedjah, Nadia3 (AUTHOR), Vijayakumar, P.4 (AUTHOR), El-Latif, Ahmed A. Abd5 (AUTHOR), Chang, Xiaojun6 (AUTHOR)
Publikováno v:
Neural Computing & Applications. Mar2023, Vol. 35 Issue 7, p5055-5080. 26p.
Autor:
Tewari, Aakanksha1, Gupta, B. B.1
Publikováno v:
International Journal of Networking & Virtual Organisations. 2018, Vol. 18 Issue 2, p97-111. 15p.
Tremendous and extraordinary growths in the field of internet, intranet, extranet and its users have developed an innovative era of great global competition and contention. Denial of service attack by multiple nodes is accomplished of disturbing the
Externí odkaz:
http://arxiv.org/abs/1304.7073
Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick financial organization and customers. Criminals try to lure online users by convincing them to reveal the username, passwords, credit card number and
Externí odkaz:
http://arxiv.org/abs/1302.0629
Publikováno v:
International Journal of Computer and Electrical Engineering (IJCEE), vol. 2, number 2, pp. 268-276, 2010
The significance of the DDoS problem and the increased occurrence, sophistication and strength of attacks has led to the dawn of numerous prevention mechanisms. Each proposed prevention mechanism has some unique advantages and disadvantages over the
Externí odkaz:
http://arxiv.org/abs/1208.3557
Botnets are prevailing mechanisms for the facilitation of the distributed denial of service (DDoS) attacks on computer networks or applications. Currently, Botnet-based DDoS attacks on the application layer are latest and most problematic trends in n
Externí odkaz:
http://arxiv.org/abs/1208.0403