2022
DOI: 10.1007/s11042-022-13336-7
|View full text |Cite
|
Sign up to set email alerts
|

Nature-inspired adaptive decision support system for secured clustering in cyber networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…In addition to that, the author in Reference 36 has proposed a method based on monitoring and securing petroleum product distribution records in a database of decentralized ledgers using blockchain technology. In the domain of cybersecurity, researchers contributed their study and implementation of various proactive methods that improve the security of data from attackers 37–41 . The main motivation of the technique has been implemented for securing the transaction of the various database records provided in the ledger.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to that, the author in Reference 36 has proposed a method based on monitoring and securing petroleum product distribution records in a database of decentralized ledgers using blockchain technology. In the domain of cybersecurity, researchers contributed their study and implementation of various proactive methods that improve the security of data from attackers 37–41 . The main motivation of the technique has been implemented for securing the transaction of the various database records provided in the ledger.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the domain of cybersecurity, researchers contributed their study and implementation of various proactive methods that improve the security of data from attackers. [37][38][39][40][41] The main motivation of the technique has been implemented for securing the transaction of the various database records provided in the ledger. This helped in protecting the records from fraudulent activity, tampering, and corruption by chain participants.…”
Section: Blockchainmentioning
confidence: 99%
“…When two WSN nodes are within one hop distance, the direct trust of x i is calculated by x j at time t. Each cyclic trust evaluation round includes WSN node x j observing WSN node x i directly. Since aggressive users are primarily concerned with packet loss and fake acknowledgment, the packet of transmission behavior (TB) parameter allows for accurate estimation of the WSN node through x-rate estimation [40].…”
Section: Packet Of Transmission Behaviormentioning
confidence: 99%
“…Weight parameters represent the Trust-coefficient between the nodes. The PF is calculated as shown in Equation ( 2) [40].…”
Section: Packet Of Transmission Behaviormentioning
confidence: 99%
See 1 more Smart Citation