International Journal of Pervasive Computing and Communications: Volume 19 Issue 5

Subjects:

Table of contents

Network traffic analysis through deep learning for detection of an army of bots in health IoT network

Geetha K., Brahmananda S.H.

IoT has a wide range of applications in the health-care sector and has captured the interest of many academic and industrial communities. The health IoT devices suffer from botnet…

An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network

Mythili Boopathi, Meena Chavan, Jeneetha Jebanazer J., Sanjay Nakharu Prasad Kumar

The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that…

Real-time optimal protocol prediction of quantum key distribution using machine learning

Arthi R., Nayana J.S., Rajarshee Mondal

The purpose of optimal protocol prediction and the benefits offered by quantum key distribution (QKD), including unbreakable security, there is a growing interest in the practical…

Performance analysis of a cloud-based network analytics system with multiple-source data aggregation

Tulsi Pawan Fowdur, Lavesh Babooram

The purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to classify…

52

Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators

Souad El Houssaini, Mohammed-Alamine El Houssaini, Jamal El Kafi

In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly…

A load-balanced hybrid heuristic for allocation of batch of tasks in cloud computing environment

Sophiya Shiekh, Mohammad Shahid, Manas Sambare, Raza Abbas Haidri, Dileep Kumar Yadav

Cloud computing gives several on-demand infrastructural services by dynamically pooling heterogeneous resources to cater to users’ applications. The task scheduling needs to be…

67

Source location privacy preservation in IoT-enabled event-driven WSNs

Nidhi Sharma, Ravindara Bhatt

Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system…

Optimized security algorithm for connected vehicular network

Deepak Choudhary

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…

Cover of International Journal of Pervasive Computing and Communications

ISSN:

1742-7371

Online date, start – end:

2005

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Lizzy Seal