Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Complete Cototal Roman Domination Number of a Graph for User Preference Identification in Social Media

    J. Maria Regila Baby*, K. Uma Samundesvari

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2405-2415, 2023, DOI:10.32604/csse.2023.032240

    Abstract Many graph domination applications can be expanded to achieve complete cototal domination. If every node in a dominating set is regarded as a record server for a PC organization, then each PC affiliated with the organization has direct access to a document server. It is occasionally reasonable to believe that this gateway will remain available even if one of the scrape servers fails. Because every PC has direct access to at least two documents’ servers, a complete cototal dominating set provides the required adaptability to non-critical failure in such scenarios. In this paper, we presented a method for calculating a… More >

  • Open Access

    ARTICLE

    A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats

    R. T. Pavendan1,*, K. Sankar1, K. A. Varun Kumar2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3331-3348, 2023, DOI:10.32604/iasc.2023.028029

    Abstract Attacks on the cyber space is getting exponential in recent times. Illegal penetrations and breaches are real threats to the individuals and organizations. Conventional security systems are good enough to detect the known threats but when it comes to Advanced Persistent Threats (APTs) they fails. These APTs are targeted, more sophisticated and very persistent and incorporates lot of evasive techniques to bypass the existing defenses. Hence, there is a need for an effective defense system that can achieve a complete reliance of security. To address the above-mentioned issues, this paper proposes a novel honeypot system that tracks the anonymous behavior… More >

  • Open Access

    ARTICLE

    Construction of an Energy-Efficient Detour Non-Split Dominating Set in WSN

    G. Sheeba1,*, T. M. Selvarajan2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 689-700, 2022, DOI:10.32604/cmc.2022.021781

    Abstract Wireless sensor networks (WSNs) are one of the most important improvements due to their remarkable capacities and their continuous growth in various applications. However, the lifetime of WSNs is very confined because of the delimited energy limit of their sensor nodes. This is the reason why energy conservation is considered the main exploration worry for WSNs. For this energy-efficient routing is required to save energy and to subsequently drag out the lifetime of WSNs. In this report we use the Ant Colony Optimization (ACO) method and are evaluated using the Genetic Algorithm (GA), based on the Detour non-split dominant set… More >

Displaying 1-10 on page 1 of 3. Per Page