Assessing the Effects of Blackhole Attacks on MANET Reliability and Security DOI
Amjed Abbas Ahmed,

Saif Aamer Fadhil,

Ali Hamza Najim

et al.

2022 International Conference on Decision Aid Sciences and Applications (DASA), Journal Year: 2024, Volume and Issue: unknown, P. 1 - 6

Published: Dec. 11, 2024

Language: Английский

Side-channel attacks on convolutional neural networks based on the hybrid attention mechanism DOI Creative Commons
Tao Feng, Huan Gao, Xiaomin Li

et al.

Deleted Journal, Journal Year: 2025, Volume and Issue: 7(5)

Published: April 24, 2025

Language: Английский

Citations

0

Shard-DAG: A scalable and secure block-DAG sharding scheme for AI-driven 6G networks DOI Creative Commons
Yongkai Fan, W. Zhang, Guodong Wu

et al.

Digital Communications and Networks, Journal Year: 2025, Volume and Issue: unknown

Published: May 1, 2025

Language: Английский

Citations

0

A survey of Machine Learning-based Physical-Layer Authentication in wireless communications DOI
Rui Meng, Bingxuan Xu, Xiaodong Xu

et al.

Journal of Network and Computer Applications, Journal Year: 2024, Volume and Issue: 235, P. 104085 - 104085

Published: Dec. 11, 2024

Language: Английский

Citations

2

Causal Effects of Adversarial Attacks on AI Models in 6G Consumer Electronics DOI
Da Guo,

Z.B. Feng,

Zhen Zhang

et al.

IEEE Transactions on Consumer Electronics, Journal Year: 2024, Volume and Issue: 70(3), P. 5804 - 5813

Published: Aug. 1, 2024

Language: Английский

Citations

0

Building a Resilient Architecture with an Intelligent System Based on Support Vector Machines Algorithm for Cybersecurity DOI
Israa Akram Alzuabidi

Journal of Electronics Computer Networking and Applied Mathematics, Journal Year: 2024, Volume and Issue: 45, P. 16 - 26

Published: Sept. 27, 2024

This research focuses on establishing a competent and sustainable cybersecurity structure stimulated by Support Vector Machine (SVM) algorithms based detection of intrusions. The paper first provides clear concise method that builds the benchmark dataset known as KDD Cup 1999 dataset. In particular, with help data collection, preprocessing, feature selection, SVM model gives opportunity to classify different types network attack, such DoS attack or user-to-root attack. systematic approach ensures only favorable is considered in making note difference between normal traffic traffic. From this study, developed was accurate efficient, classification accuracy being 98.7% F1-score 96.7% respectively which demonstrated efficiency real world applications.Besides, development model, also includes components like real-time control automatic response. integration enables system scrutinize time take an appropriate action case threat. Through automated alerts mitigation actions must be taken once intrusion detected architecture not identifies infringements but corrects violations taking place network. proactive rather helpful nowadays, threats are already very high come frequently digital level. Hazard response capability further strengthens system, thus crucial reducing vulnerability outages.

Language: Английский

Citations

0

Assessing the Effects of Blackhole Attacks on MANET Reliability and Security DOI
Amjed Abbas Ahmed,

Saif Aamer Fadhil,

Ali Hamza Najim

et al.

2022 International Conference on Decision Aid Sciences and Applications (DASA), Journal Year: 2024, Volume and Issue: unknown, P. 1 - 6

Published: Dec. 11, 2024

Language: Английский

Citations

0