2019 IEEE 1st International Conference on Energy, Systems and Information Processing (ICESIP) 2019
DOI: 10.1109/icesip46348.2019.8938253
|View full text |Cite
|
Sign up to set email alerts
|

Markov Chain Based Ant Colony Approach for Mitigating DDoS Attacks Using Integrated Vehicle Mode Analysis in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Furthermore, because of the evergrowing rate of technological advancement, we are creating more waste than ever every day. Most of these wastes are hazardous to the environment, and due to the growing amount of waste, we are damaging the ecosystem more and more every day [13]. Moreover, very few authorities are making any necessary moves yet.…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, because of the evergrowing rate of technological advancement, we are creating more waste than ever every day. Most of these wastes are hazardous to the environment, and due to the growing amount of waste, we are damaging the ecosystem more and more every day [13]. Moreover, very few authorities are making any necessary moves yet.…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, human error has also contributed as an obstacle towards the implementation of digital security in an organization [6]. This could be proven from a survey conducted by IBM in 2018, indicating that the misconfiguration of cloud servers due to human error is the biggest risk in cyber security in cloud computing with 62% of survey participants made up of IT and security professionals, while 55% of them noting misuse of employee credentials and improper access as one of the human error contributing to challenges while implementing cyber security measures, followed by insecure interfaces at 50% [19]. In fact, misconfiguration of systems usually allows cyber criminals to access large data platforms consisting of usernames, passwords, credit card data, health data, national identification numbers, email addresses, etc.…”
Section: Internal Cyber Security Challenges Within the Organizationmentioning
confidence: 98%
“…Although it has been seen by many as a benefit but the use of social networking websites has been so popular that many have use it in the wrong manner to abuse it and gain advantages over it but causing harm to another. The discussion in this literature review is by Mohammed Ali Al-garadi , Kasturi Dewi Varathan and Sri Devi Ravana which is about the experimental case of cyberbullying detection in the Twitter social network [6].…”
Section: Cyberbullying Detection In the Twitter Networkmentioning
confidence: 99%