期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Novel Hybrid Clustering Based Transmission Protocol for Wireless Body Area Networks
1
作者 Neelam Sharma Harshita Chadha +2 位作者 Karan Singh B.M.Singh Nitish Pathak 《Computers, Materials & Continua》 SCIE EI 2021年第11期2459-2473,共15页
Wireless sensor networks are a collection of intelligent sensor devices that are connected to one another and have the capability to exchange information packets amongst themselves.In recent years,this field of resear... Wireless sensor networks are a collection of intelligent sensor devices that are connected to one another and have the capability to exchange information packets amongst themselves.In recent years,this field of research has become increasingly popular due to the host of useful applications it can potentially serve.A deep analysis of the concepts associated with this domain reveals that the two main problems that are to be tackled here are throughput enhancement and network security improvement.The present article takes on one of these two issues namely the throughput enhancement.For the purpose of improving network productivity,a hybrid clustering based packet propagation protocol has been proposed.The protocol makes use of not only clustering mechanisms of machine learning but also utilizes the traditional forwarding function approach to arrive at an optimum model.The result of the simulation is a novel transmission protocol which significantly enhances network productivity and increases throughput value. 展开更多
关键词 Forwarding function wireless sensor networks WSNS WBANs energy characteristics CLUSTERING hybrid mechanism dissipated energy network stability
下载PDF
An emerging threat Fileless malware:a survey and research challenges 被引量:4
2
作者 Sudhakar Sushil Kumar 《Cybersecurity》 CSCD 2020年第1期42-53,共12页
With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware d... With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware does not use traditional executables to carry-out its activities.So,it does not use the file system,thereby evading signature-based detection system.The fileless malware attack is catastrophic for any enterprise because of its persistence,and power to evade any anti-virus solutions.The malware leverages the power of operating systems,trusted tools to accomplish its malicious intent.To analyze such malware,security professionals use forensic tools to trace the attacker,whereas the attacker might use anti-forensics tools to erase their traces.This survey makes a comprehensive analysis of fileless malware and their detection techniques that are available in the literature.We present a process model to handle fileless malware attacks in the incident response process.In the end,the specific research gaps present in the proposed process model are identified,and associated challenges are highlighted. 展开更多
关键词 Fileless malware BOTNET Incident response Memory forensics Incident investigation Memory resident malware ROOTKIT
原文传递
An emerging threat Fileless malware:a survey and research challenges
3
作者 Sudhakar Sushil Kumar 《Cybersecurity》 2018年第1期668-679,共12页
With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware d... With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware does not use traditional executables to carry-out its activities.So,it does not use the file system,thereby evading signature-based detection system.The fileless malware attack is catastrophic for any enterprise because of its persistence,and power to evade any anti-virus solutions.The malware leverages the power of operating systems,trusted tools to accomplish its malicious intent.To analyze such malware,security professionals use forensic tools to trace the attacker,whereas the attacker might use anti-forensics tools to erase their traces.This survey makes a comprehensive analysis of fileless malware and their detection techniques that are available in the literature.We present a process model to handle fileless malware attacks in the incident response process.In the end,the specific research gaps present in the proposed process model are identified,and associated challenges are highlighted. 展开更多
关键词 Fileless malware BOTNET Incident response Memory forensics Incident investigation Memory resident malware ROOTKIT
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部