Improvement in Quality of Service Against Doppelganger Attacks for Connected Network
Because they are in a high-risk location, remote sensors are vulnerable to malicious ambushes. A doppelganger attack, in which a malicious hub impersonates a legitimate network junction and then attempts to take control of the entire network, is one of the deadliest types of ambushes. Because remote...
Main Authors: | Deepak Choudhary, Roop Pahuja |
---|---|
Format: | Article |
Language: | English |
Published: |
Universidad Internacional de La Rioja (UNIR)
2022-09-01
|
Series: | International Journal of Interactive Multimedia and Artificial Intelligence |
Subjects: | |
Online Access: | https://www.ijimai.org/journal/bibcite/reference/3151 |
Similar Items
-
The Doppelgänger
by: Ahmed Naiem, et al.
Published: (2016-03-01) -
Doppelganger /
by: 443581 Brennan, Marie
Published: (2006) -
Doppelgänger Architecture : The Dialectical Pair as a Representational System
by: Luz Carruthers
Published: (2018-12-01) -
Reliable detection of doppelgängers based on deep face representations
by: Christian Rathgeb, et al.
Published: (2022-05-01) -
Uniqueness Perception and Willingness to Buy Protected Geographical Origin Versus Doppelgänger Brands
by: Paulius Neciunskas, et al.
Published: (2017-12-01)