0% found this document useful (0 votes)
2 views4 pages

A Study On Malicious Node Detection in Different Application Domains

The document discusses a study on malicious node detection in online networks, highlighting the importance of security and privacy in the face of cyber threats. It surveys existing technologies and methodologies, including federated learning and deep learning, for detecting malicious nodes. The paper is structured into sections covering the introduction, literature survey, methodologies, and future work.

Uploaded by

Jayaram B
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views4 pages

A Study On Malicious Node Detection in Different Application Domains

The document discusses a study on malicious node detection in online networks, highlighting the importance of security and privacy in the face of cyber threats. It surveys existing technologies and methodologies, including federated learning and deep learning, for detecting malicious nodes. The paper is structured into sections covering the introduction, literature survey, methodologies, and future work.

Uploaded by

Jayaram B
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

IEEE.

org IEEE Xplore IEEE SA IEEE Spectrum More Sites Subscribe Donate Cart Create Account Personal Sign In
 

 Browse  My Settings  Help  Institutional Sign In

Institutional Sign In

All  

ADVANCED SEARCH

Conferences > 2023 International Conference... 


Institute of Electrical and Electronics Engineers

A Study on Malicious Node Detection in Different Application Domains


Publisher: IEEE Cite This  PDF

B. Jayaram ; T. Sethukarasi ; C. Jayakumar All Authors 

    
31
Full Alerts
Text Views
Manage Content Alerts
Add to Citation Alerts

Abstract

Downl
Document Sections PDF

I. Introduction
Abstract:
II. LITERATURE SURVEY Nowadays security and privacy in online networks is always questionable due to various factors in terms of cyber
security in the form of attackers present outside the net... View more
III. METHODOLOGY

 Metadata
IV. CONCLUSION AND
FUTURE WORK Abstract:
Nowadays security and privacy in online networks is always questionable due to various factors in terms of cyber
security in the form of attackers present outside the network. In this paper we have taken malicious node detection as a
Authors
major point of research and done a survey on existing technologies in malicious node detection. This paper we have
analyzed applications were malicious node has to be detected. Malicious node detection solves the issue of security
Figures
and privacy in networks by using various approaches such as federated learning, machine learning, differential privacy,
convolution neural networks, and deep learning concepts. This paper is organized in to various focuses on introduction,
References
literature survey, methodologies and its comparison, conclusion and future ideas.

Keywords
Published in: 2023 International Conference on Research Methodologies in Knowledge Management, Artificial
Metrics Intelligence and Telecommunication Engineering (RMKMATE)

More Like This Date of Conference: 01-02 November 2023 DOI: 10.1109/RMKMATE59243.2023.10369610

Footnotes Date Added to IEEE Xplore: 03 January 2024 Publisher: IEEE

 ISBN Information: Conference Location: Chennai, India

Contents

I. Introduction
Cyber security is important part in everyday life of human
Sign being among
in to Continue that malicious node detection is plays vital
Reading
part in attacking cyberspace and data. Thereby attackers attack and gain insight in to any data and misuse them
for illegal purpose. Malicious or a suspicious node is available in the network which behaves abnormally.

Authors 
Figures 
References 
Keywords 
Metrics 
Footnotes 

More Like This

Maintaining Privacy in Medical Imaging with Federated Learning, Deep Learning, Differential Privacy, and Encrypted Computation
2021 6th International Conference for Convergence in Technology (I2CT)
Published: 2021

A Survey of Privacy Preserving Methods based on Differential Privacy for Medical Data
2024 7th World Conference on Computing and Communication Technologies (WCCCT)
Published: 2024

Show More
IEEE Personal Account Purchase Details Profile Information Need Help? Follow

CHANGE PAYMENT OPTIONS COMMUNICATIONS US & CANADA: +1 800    


USERNAME/PASSWORD PREFERENCES 678 4333
VIEW PURCHASED
DOCUMENTS PROFESSION AND WORLDWIDE: +1 732
EDUCATION 981 0060

TECHNICAL INTERESTS CONTACT & SUPPORT

About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | IEEE Ethics Reporting  | Sitemap |
IEEE Privacy Policy
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of
humanity.

© Copyright 2024 IEEE - All rights reserved, including rights for text and data mining and training of artificial intelligence and similar technologies.

IEEE Account

» Change Username/Password

» Update Address

Purchase Details

» Payment Options
» Order History

» View Purchased Documents

Profile Information

» Communications Preferences

» Profession and Education


» Technical Interests

Need Help?

» US & Canada: +1 800 678 4333

» Worldwide: +1 732 981 0060


» Contact & Support

About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | Sitemap | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
© Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

You might also like