[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 26, Issue 52017Final Issue
Publisher:
  • Taylor & Francis, Inc.
  • 325 Chestnut St. Suite 800 Philadelphia, PA
  • United States
ISSN:1939-3555
EISSN:1939-3547
Reflects downloads up to 19 Dec 2024Bibliometrics
Skip Table Of Content Section
article
Identification of malicious edge devices in fog computing environments

Device security is one of the major challenges for successful implementation of Internet of Things IoT and fog computing. Researchers and IT organizations have explored many solutions to protect systems from unauthenticated device attacks known as ...

article
Multivariate correlation coefficient and mutual information-based feature selection in intrusion detection

Feature selection is one of the major problems in an intrusion detection system IDS since there are additional and irrelevant features. This problem causes incorrect classification and low detection rate in those systems. In this article, four feature ...

article
A modified AODV protocol for preventing blackhole attack in MANETs

Wireless Mobile Ad-Hoc Networks MANETs are infrastructure-less networks commonly used for dynamic connection between nodes. These networks work without any external router for maintaining the connection and the nodes themselves behave like a router. Ad-...

article
Fault analysis on Kalyna

Kalyna is a block cipher that has been selected as the result of the Ukrainian National Public Cryptographic Competition 2007–2010. Two important criteria for the selection of this new standard cipher were a high level of security and being able to work ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.