Rajesh Bansode
YOU?
Author Swipe
Robust Framework for Detecting and Classifying Network-Based Attacks Using Ensemble Machine Learning Approach Open
Cybersecurity threats are increasingly sophisticated, making it critical to design advanced systems for detecting and mitigating network-based attacks. However, existing approaches often face limitations in accuracy, scalability, and adapt…
Probabilistic Robust Damping Controller Optimization for Mitigating Subsynchronous Control Interaction in <span>DFIG</span> and <span>PMSG</span>‐Based Wind Farms Open
Advanced control and mitigation solutions are required due to the enormous challenges posed by sub‐synchronous control interaction in wind farms. These concerns include system instability, potential damage to turbines, and grid stability i…
Attack Analysis on Hybrid-SIMON-SPECKey Lightweight Cryptographic Algorithm for IoT Applications Open
Objective: To perform attack analysis on new developed hybrid-SIMON-SPECKey lightweight cryptographic algorithms and compare its strength with existing SIMON and SPECK Lightweight cryptographic algorithm. Methods: A hybrid-SIMON-SPECKey al…
A Hybrid Feature Selection Approach Incorporating Mutual Information and Genetics Algorithm for Web Server Attack Detection Open
Objectives: To improve accuracy and reduce the computational overheads of Machine Learning (ML) classifiers to identify web server threats, develop a feature selection strategy that extracts pertinent and important features from the networ…
Lightweight Cryptography Using Pairwise Key Generation and Malicious Node Detection in Large Wireless Sensor Network Open
<div>\n<h2>Abstract</h2>\n<p><strong>Objectives:</strong> To design and develop pairwise key generation techniques for malicious node detection in wireless sensor network. <strong>Method:…
Survey on Securing IoT Data using Homomorphic Encryption Scheme Open
In today’s world everyone is using cloud services. Every user uploads his/her sensitive data on cloud in encrypted form. If user wants to perform any type of computation on cloud data, user has to share credentials with cloud administrator…
Performance Evaluation of 802.11g Architecture Using Security Protocols Based on Index Policy Method Open
Wireless local area networks (WLANs) are beginning to play a much larger role in corporate network environments.The 802.11g specification is a standard for wireless local area networks (WLANs) that offers transmission over relatively short…
Performance Measurement of GSTEB Protocol Using NS-2 Open
The quick growth in the network multimedia equipment have allowed real-time digital services such as video conferencing, online games and distance education to grow on the conventional internet tasks. The Wireless Senor Network (WSN) has b…
Performance Evaluation of MANET Network Parameters Using AODV Protocol for HEAACK Enhancement Open
MANETs are Vulnerable to malicious attackers because of their open medium and wide distribution of malicious attackers. Intrusion Detection System detects and reports the malicious activity in ad hoc networks. IDSs usually act as the secon…
Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points Open
In general users tend to choose memorable passwords that are easy for attackers to guess, but strong system assigned passwords are hard for users to remember. In this paper focuses on the integrated evaluation of the Persuasive Cued Click …
Performance Evaluation and Measurement for Energy Efficient Wireless Networks Open
Growth of high-data-rate applications is increasing day by day, more energy is consumed in wireless networks to guarantee quality of service. The data rate expected to meet in latest 4G is up to 1Gbps.In**creasing energy efficiency in wire…
AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection Open
Data security has a major role in the development of communication system, where more randomization in the secret keys increases the security as well as the complexity of the cryptography algorithms. In the recent years network security ha…