802.11 Frame-level Network IDS for Public Wireless Networks (Englisch)
- Neue Suche nach: Sujanani, Anish
- Neue Suche nach: Pai, Shashidhar
- Neue Suche nach: Tuba, Milan
- Neue Suche nach: Akashe, Shyam
- Neue Suche nach: Joshi, Amit
- Neue Suche nach: Sujanani, Anish
- Neue Suche nach: Pai, Shashidhar
In:
ICT Systems and Sustainability
: Proceedings of ICT4SD 2020, Volume 1
;
Kapitel: 44
;
453-461
;
2020
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:802.11 Frame-level Network IDS for Public Wireless Networks
-
Weitere Titelangaben:Advs in Intelligent Syst., Computing
-
Beteiligte:Tuba, Milan ( Herausgeber:in ) / Akashe, Shyam ( Herausgeber:in ) / Joshi, Amit ( Herausgeber:in ) / Sujanani, Anish ( Autor:in ) / Pai, Shashidhar ( Autor:in )
-
Erschienen in:ICT Systems and Sustainability : Proceedings of ICT4SD 2020, Volume 1 ; Kapitel: 44 ; 453-461Advances in Intelligent Systems and Computing ; 1270 ; 453-461
-
Verlag:
- Neue Suche nach: Springer Singapore
-
Erscheinungsort:Singapore
-
Erscheinungsdatum:15.12.2020
-
Format / Umfang:9 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Challenges in Adoption of Secure Digitization of Graduate Assessments: Scope for Blockchain TechnologiesShankar, S. K. / Mukesh, Rajeswari / Badrinarayanan, M. K. et al. | 2020
- 2
-
Non-performing Asset Analysis Using Machine LearningJacob, Rohan Ninan et al. | 2020
- 3
-
Volatile Memory Disk Forensics: Investigate the Criminal Activity of RAMDiskMistry, Nilay / Christian, Annan / Bhavsar, Bansari et al. | 2020
- 4
-
Modem Functionality Diagnostic Tool with Graphical User Interface for Cellular NetworkBiswas, Arghya / Chauhan, Sudakar Singh / Borwankar, Antara et al. | 2020
- 5
-
Regression Model to Estimate Effort for Software-Oriented ProjectsAnanth, V. Vignaraj / Aditya, S. / Kesavan, S. Ragul / Keerthiga, B. et al. | 2020
- 6
-
Innovative Technology-Based Social Enterprises for Inclusive Sustainable Healthcare in IndiaChitrao, Pradnya Vishwas / Bhoyar, Pravin Kumar / Divekar, Rajiv et al. | 2020
- 7
-
Classification of Leaves Using Convolutional Neural Network and Logistic RegressionNaik, Sapan / Shah, Hinal et al. | 2020
- 8
-
A Low-Cost IoT-Enabled Device for Real-Time Air Quality Monitoring SystemPokala, Sai Surya Kiran / Panchami, V. / Jaisingh, Kelavath / Yedla, Sandeep Kumar et al. | 2020
- 9
-
Fuzzy-Based Predictive Analytics for Early Detection of Disease—A Machine Learning ApproachKakulapati, V. / Sai Sandeep, R. / Kranthi kumar, V. / Ramanjinailu, R. et al. | 2020
- 10
-
A Framework for Remote Health MonitoringViswavardhan Reddy, K. / Kumar, Navin et al. | 2020
- 11
-
GenNext—An Extractive Graph-Based Text Summarization Model for User ReviewsKothari, Komal / Shah, Aagam / Khara, Satvik / Prajapati, Himanshu et al. | 2020
- 12
-
An Adaptive Control for Surrogate Assisted Multi-objective Evolutionary AlgorithmsNguyen, Duc Dinh / Nguyen, Long et al. | 2020
- 13
-
Study and Analysis of NOMA Downlink Transmission Model in 5G Wireless SystemSrivastava, Sanjeev Kumar et al. | 2020
- 14
-
Network Structural Analysis Based on Graphical Measures and MetricsVerma, Atul Kumar / Jadeja, Mahipal / Saxena, Rahul et al. | 2020
- 15
-
Lung Tumor Classification Using CNN- and GLCM-Based FeaturesNaik, Amrita / Edla, Damodar Reddy et al. | 2020
- 16
-
A Distributed Implementation of Signature Matching Algorithms for IoT Intrusion DetectionDomb, Menachem et al. | 2020
- 17
-
Graph-Based Multi-document Text Summarization Using NLPMore, Abhilasha / Dalal, Vipul et al. | 2020
- 18
-
Fault Exploratory Data Analysis of Real-Time Marine Diesel Engine Data Using R ProgrammingChin, Cheng Siong / Nazli, Nursyafiqah Binte et al. | 2020
- 19
-
A Hybrid Key Management System Based on ECC and Data Classification to Secure Data in the CloudPurohit, Hinddeep / Vaghela, Ravirajsinh et al. | 2020
- 20
-
Life Cycle Management for Indian Naval Warship EquipmentBhagwat, Alok / Chitrao, Pradnya Vishwas et al. | 2020
- 21
-
Framework for Securing IoT Ecosystem Using Blockchain: Use Cases Suggesting Theoretical ArchitectureJain, Anshul / Singh, Tanya / Jain, Nitesh et al. | 2020
- 22
-
Feature Selection for Handwritten Signature Recognition Using Neighborhood Component AnalysisKumari, Kamlesh / Rana, Sanjeev et al. | 2020
- 23
-
Blockchain-Based E-Voting ProtocolChafe, Shreya Shailendra / Bangad, Divya Ashok / Sonune, Harsha et al. | 2020
- 24
-
SOLID: A Web System to Restore the Control of Users’ Personal DataSolanki, Manishkumar R. et al. | 2020
- 25
-
Enhanced Three-Dimensional DV-Hop AlgorithmKaushik, Abhinesh / Lobiyal, D. K. et al. | 2020
- 26
-
Synthesis of VLSI Structural Cell Partitioning Using Genetic AlgorithmRajeswari, P. / Chandra, Theodore S. / Kumar, Amith Kiran et al. | 2020
- 27
-
Identification and Classification of Foreign Bodies from Rice Grains Using Digital Image ProcessingGhatkamble, Rajlakshmi et al. | 2020
- 28
-
Improving Collaboration Between Government and Citizens for Environmental Issues: Lessons Learned from a Case in Sri LankaSapraz, Mohamed / Han, Shengnan et al. | 2020
- 29
-
A Study on Blockchain ScalabilityPawar, Manjula K. / Patil, Prakashgoud / Hiremath, P. S. et al. | 2020
- 30
-
What Influences Consumer Behavior Toward Information and Communication Technology Applications: A Systematic Literature Review of UTAUT2 ModelCastanha, Jick / Pillai, Subhash Kizhakanveatil Bhaskaran / Indrawati et al. | 2020
- 31
-
Secure and Energy-Efficient Remote Monitoring Technique (SERMT) for Smart GridRoy, Sohini / Sen, Arunabha et al. | 2020
- 32
-
Balanced Accuracy of Collaborative Recommender SystemChopra, Akanksha Bansal / Dixit, Veer Sain et al. | 2020
- 33
-
Using Transfer Learning for Detecting Drug Mentions in TweetsMehnaz, Laiba / Jindal, Rajni et al. | 2020
- 34
-
A Comprehensive and Critical Analysis of Cross-Domain Federated Identity Management DeploymentsApte, Tejaswini / Saini, Jatinderkumar R. et al. | 2020
- 36
-
Concentric Morphology Model in Detection of Masses from Mammogram: A StudyPingili, Madhavi / Shankar Lingam, M. / Rajan, E. G. et al. | 2020
- 37
-
A Survey on DevOps Techniques Used in Cloud-Based IOT MashupsGaneshan, M. / Vigneshwaran, P. et al. | 2020
- 38
-
Digital Assistant with Augmented RealityVerma, Vijay / Sharma, Aditya / Jain, Ketan Kumar / Adlakha, Sushant et al. | 2020
- 39
-
An Experimental Approach Toward Type 2 Diabetes Diagnosis Using Cultural AlgorithmPatil, Ratna / Tamane, Sharvari / Patil, Kanishk et al. | 2020
- 40
-
Predicting Students Performance Through Behavior and Computational Thinking in ProgrammingHegde, Vinayak / Meghana, H. N. / Spandana, R. / Pallavi, M. S. et al. | 2020
- 41
-
Deployment of Ambulance with Maximum Area Coverage by Using Particle Swarm Optimization AlgorithmKaur, Amandeep et al. | 2020
- 42
-
Detection of DDOS Attacks Using Machine Learning Techniques: A Hybrid ApproachVarma, Datla Anurag / Ashish, Ravi / Venkata Sai Sandeep, V. / Venkatesh, B. / Kannadasan, R. et al. | 2020
- 43
-
Revisiting Algorithms for Resource Discovery in Unstructured Peer to Peer NetworksJayan, Abhijith / Samuel, Subi George / Jayakumar, P. et al. | 2020
- 44
-
802.11 Frame-level Network IDS for Public Wireless NetworksSujanani, Anish / Pai, Shashidhar et al. | 2020
- 45
-
Machine Learning for Malicious URL DetectionWejinya, Gold / Bhatia, Sajal et al. | 2020
- 46
-
Implementation of OSPFv3 in IPv4 and IPv6 for Establishing a Wide Area NetworkSinthia, Fatema Zaman / Nasir, Afsana / Paul, Bijan / Rashid, Mohammad Rifat Ahmmad / Adnan, Md Nasim et al. | 2020
- 47
-
Obstacle Avoiding and Fire Extinguishing Robot for Everyday Fire SecurityKabir, Moumita / Popy, Fatima Noor / Paul, Bijan / Rashid, Mohammad Rifat Ahmmad / Mahmud, Khan Raqib et al. | 2020
- 48
-
A Survey on Internet of Things (IoT): Communication Model, Open Challenges, Security and Privacy IssuesVenkadeshan, R. / Jegatha, M. et al. | 2020
- 49
-
Violence Detection Through Surveillance SystemDeshmukh, Abhishek / Warang, Kshitij / Pente, Yash / Marathe, Nilesh et al. | 2020
- 50
-
Influence of Big Data Capabilities in Knowledge Management—MSMEsJha, Ravi Shankar / Sahoo, Priti Ranjan et al. | 2020
- 51
-
Logistically Supervised Aspect Category Detection Using Data Co-occurrence for Sentiment AnalysisJohn, Anice / Sheik, Reshma et al. | 2020
- 52
-
Automated Dietary Monitoring System: A Novel FrameworkMamud, Samiul / Chatterjee, Punyasha / Bandyopadhyay, Saubhik / Bhandari, Suchandra et al. | 2020
- 53
-
Intruder Insinuation and Smart Surveillance Using Face Detection and Mask DetectionRajesh Khanna, M. / Prakash Raj, G. / Prem Kumar, S. / Vignesh Raaj, N. S. et al. | 2020
- 54
-
Misinformation Analysis During Covid-19 PandemicRastogi, Shubhangi / Bansal, Divya et al. | 2020
- 55
-
An Agent-Based Cloud Service Negotiation in Hybrid Cloud ComputingDeochake, Saurabh / Mukhopadhyay, Debajyoti et al. | 2020
- 56
-
IoT-Based Smart Farming Application for Sustainable AgricultureHatture, Sanjeevakumar M. / Yankati, Pallavi V. et al. | 2020
- 57
-
Follow Me: A Human Following Robot Using Wi-Fi Received Signal Strength IndicatorGeetha, V. / Salvi, Sanket / Saini, Gurdeep / Yadav, Naveen / Singh Tomar, Rudra Pratap et al. | 2020
- 58
-
Implementation of Arithmetic Unit for RNS Using 2n + 3 as BaseAiholli, Nagaraj R. / Wali, Uday V. / Rachh, Rashmi et al. | 2020
- 59
-
Hybridization of Artificial Bee Colony Algorithm with Estimation of Distribution Algorithm for Minimum Weight Dominating Set ProblemShetgaonkar, Sima / Singh, Alok et al. | 2020
- 60
-
Privacy Preservation for Data Sharing with Multi-party Access Control in Cloud Computing: A Review PaperKhot, Shubhangi Tanaji / Manjrekar, Amrita A. / Deshmukh, Rashmi J. et al. | 2020
- 61
-
Pixel-Based Attack on ODENet ClassifiersYaratapalli, Nitheesh Chandra / Venkataraman, Reethesh / Dinesan, Abhishek / Bhagvandas, Ashni Manish / Sriram, Padmamala et al. | 2020
- 62
-
Survey on Advanced Spectrum Sharing Using Cognitive Radio TechniqueHassan, Mohamed / Singh, Manwinder / Hamid, Khaild et al. | 2020
- 63
-
An AI-Based Pedagogical Tool for Creating Sketched Representation of Emotive Product Forms in the Conceptual Design StagesPrajapati, Sunny Prakash / Bhaumik, Rahul / Kumar, Tarun / Sait, Unais et al. | 2020
- 64
-
Social Interaction-Enabled Industrial Internet of Things for Predictive MaintenanceRoopa, M. S. / Pallavi, B. / Buyya, Rajkumar / Venugopal, K. R. / Iyengar, S. S. / Patnaik, L. M. et al. | 2020
- 65
-
Emerging Trends in the Marketing of Financially Engineered Insurance ProductsRatnakaram, Sunitha / Chakravaram, Venkamaraju / Vihari, Nitin Simha / Vidyasagar Rao, G. et al. | 2020
- 66
-
Attitude of the International Students Towards Integrating ICT in Foreign Language Learning: A Case StudyKuddus, Khushboo / Khan, Nafis Mahmud et al. | 2020
- 67
-
Limiting Check Algorithm: Primality TestSethi, Gunjan / Harsh et al. | 2020
- 68
-
Factors Affecting the Local GovernanceTrung, Ngo Sy / Hai, Do Huu / Van Tuan, Pham / Long, Nguyen Tien et al. | 2020
- 69
-
A Multi-factorial Code Coverage Based Test Case Selection and Prioritization for Object Oriented ProgramsVats, Prashant / Aalam, Zunaid / Kaur, Satnam / Kaur, Amritpal / Kaur, Saravjit et al. | 2020
- 70
-
New Horizons for the Application of Microalgae in the National EconomyMedvedeva, L. N. / Roiss, O. et al. | 2020
- 71
-
Context of the Ghanaian Government: Social Media and Access to InformationKofi Frimpong, Adasa Nkrumah / Li, Ping / Adu-Gyamfi, Samuel / Obiora, Sandra Chukwudumebi et al. | 2020
- 72
-
Convolutional Neural Network and Data Augmentation for Behavioral-Based Biometric User IdentificationMekruksavanich, Sakorn / Jitpattanakul, Anuchit et al. | 2020
- 73
-
Cybersecurity Attacks: Analysis of “WannaCry” Attack and Proposing Methods for Reducing or Preventing Such Attacks in FutureAlgarni, Sumaiah et al. | 2020
- 74
-
Enhancing Trust and Immutability in Cloud ForensicsChauhan, Pranay / Bansal, Pratosh et al. | 2020
- 75
-
A Fuzzy Time Series Prediction Model of the COVID-19 EpidemicAlam, Mohammad Minhazul / Hossain, S. M. Shahadat / Shishir, Md. Romman Riyadh / Hasan, Sadman / Huda, Eumna / Yeasmin, Sabrina / Motaleb, Abdul / Rahman, Rashedur M. et al. | 2020
- 76
-
Modelling of Generation and Utilization Control for Isolated Hybrid Microgrid for Rural ElectrificationSingh, Kuldip / Mishra, Satyasis / Rathee, Davinder Singh / Gemecha, Demissie Jobir / Mohanty, R. C. et al. | 2020
- 77
-
Toyama de Walking: Practice of Location-Based Data Collection Using Augmented Reality ApplicationsIeiri, Yuya / Tsai, Hung-Ya / Hishiyama, Reiko et al. | 2020
- 78
-
Graphene-Based Wireless Power Transmission: Charge as You DriveNissimagoudar, P. C. / Gireesha, H. M. / Shet, R. M. / Iyer, Nalini C. / Bijapur, Ajit / Aishwarya, H. R. et al. | 2020
- 79
-
Vision-Based Driver Authentication and Alertness Detection Using HOG Feature DescriptorNissimagoudar, P. C. / Nandi, A. V. / Gireesha, H. M. / Shet, R. M. / Iyer, Nalini C. et al. | 2020
- 80
-
ICT4D in Channelling Welfare Services in India: Case Study of HaqdarshakRamdey, Komal / Bokhari, Hasnain et al. | 2020