Survey Report on Cyber Security related issues on Nuclear Stations, Vehicles and Wireless Networks
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2019 by IJCTT Journal|
|Year of Publication : 2019|
|Authors : Sarvesh Joshi|
|DOI : 10.14445/22312803/IJCTT-V67I7P103|
MLA Style:Sarvesh Joshi"Survey Report on Cyber Security related issues on Nuclear Stations, Vehicles and Wireless Networks" International Journal of Computer Trends and Technology 67.7 (2019): 14-18.
APA Style Sarvesh Joshi. Survey Report on Cyber Security related issues on Nuclear Stations, Vehicles and Wireless Networks International Journal of Computer Trends and Technology, 67(7),14-18.
Lately, the world has turned into a technological world. So, security was and will also be a concern as well as a priority with the adaptive technology. The domain selected was Cyber Security and the Sub – Domain which was targeted was the DOS attack. The first paper gave measures to solve issues related to DOS attack on Nuclear Stations. The second paper gave measures to solve issues related to DOS attack on Vehicles. The third paper gave measures to solve issues related to DOS attack on Wireless Networks. The authors of each paper gave their individual solutions to the problems they had faced and the solution to it using few techniques and models.
 Jinsoo Shin, Hanseong Son, Gyunyoung Heo, Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET, Department of Nuclear Engineering, Kyung Hee University,Republic Of Korea, 2016.
 Syed Rizvi, Jonathan Willet, Donte Perino, Seth Marasco, Chandler Condo, A Threat to Vehicular Cyber Security and the Urgenct for Correction, Department of Information Science and Technology, Penn State University, Altoona, USA, 2017.
 Neha Agrawal, Shashikala Tapaswi, The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network, Int J Wireless Inf Networks, New York, USA, 2015.
 R.V. Deshmukh, K.K. Devadkar, ?Understanding DDoS Attack & Its Effect In Cloud Environment?, Procedia Computer Science 49 ( 2015 ) 202 – 210, 4th International Conference on Advances in Computing, Communication and Control (ICAC3’15).
 A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition, IEEE Transactions on Circuits and Systems for Video Technology 14 (1) (2004).
 Abdulkader A. Alfantookh "DoS Attacks Intelligent Detection using Neural Networks" J. King Saud University, Vol. 18, Computer & Information Science.
 Stephen M. Specht, Ruby B. Lee, "Distributed Denial of Service:Taxonomies of Attacks, Tools and Countermeasures," Electrical Engineering, Princeton University Princeton, NJ 08544.
Cyber Security, Nuclear Security, Vehicular Security, Wireless Network Security