Identification of malicious edge devices in fog computing environments
Device security is one of the major challenges for successful implementation of Internet of Things IoT and fog computing. Researchers and IT organizations have explored many solutions to protect systems from unauthenticated device attacks known as ...
Multivariate correlation coefficient and mutual information-based feature selection in intrusion detection
Feature selection is one of the major problems in an intrusion detection system IDS since there are additional and irrelevant features. This problem causes incorrect classification and low detection rate in those systems. In this article, four feature ...
A modified AODV protocol for preventing blackhole attack in MANETs
Wireless Mobile Ad-Hoc Networks MANETs are infrastructure-less networks commonly used for dynamic connection between nodes. These networks work without any external router for maintaining the connection and the nodes themselves behave like a router. Ad-...
Fault analysis on Kalyna
Kalyna is a block cipher that has been selected as the result of the Ukrainian National Public Cryptographic Competition 2007–2010. Two important criteria for the selection of this new standard cipher were a high level of security and being able to work ...