SlideShare una empresa de Scribd logo
1 de 42
11/06/13

Dept. of ECE

1
EAACK—A Secure IntrusionDetection
System for MANETs

11/06/13

Dept. of ECE

2
Contents





Introduction
What is MANET????
Need For IDS????
IDS
1.
2.
3.

Watch dog
TWOACK
AACK

 EAACK
 Performance

Evaluation
 Simulation configuration
 Advantages
 Future enhancement
 Conclusion
 Reference
11/06/13

Dept. of ECE

3
Introduction
MANET -Mobile Ad hoc NETworks
IDS

-Intrusion Detection Systems

EAACK-Enhanced Adaptive ACKnowledgement

11/06/13

Dept. of ECE

4
Mobile Ad hoc NETworks
Wireless network
Ad hoc = “for this PURPOSE”
Used to exchange information
NODES = transmitter + receiver


Nodes may be mobile
Each node is willing to forward data to other nodes
Communcation can be direct or indirect
Nodes communicates directly within their ranges
Otherwise rely on neighbours (indirectly)

11/06/13

Dept. of ECE

5
Continuation.....

 Properties

of MANETs

No fixed infrastructure
Self configuring ability
Dynamic topology
Decentralized network

11/06/13

Dept. of ECE

6
Continuation….
 Routes

between nodes may contain multiple hops

Nodes act as routers to forward packets for each other
Node mobility may cause the routes change

B

A

A

B
C

C
D

D

11/06/13

Dept. of ECE

7
Continuation….
Application

of MANETS

Military application
◦ Combat regiment in the field
◦ Perhaps 4000-8000 objects
in constant unpredictable
motion.
◦ Intercommunication of forces
◦ Proximity, plan of battle

Sensor networks
Automotive networks
Industrial application
11/06/13

Dept. of ECE

8
MANET

vulnerable to malicious attackers

o Open medium
o Wide distribution of nodes
Routing

protocols assumes nodes are
always cooperative
Nodes are not physically protected

11/06/13

Dept. of ECE

9
IDS
 Intrusion

Detection System
 Detect and report the malicious activity in ad hoc
networks
 Researchers have proposed a number of
collaborative IDS system
1. Watch dog
2. TWOACK
3. AACK

11/06/13

Dept. of ECE

10
Watch dog

11/06/13

Dept. of ECE

11
Ambiguous collision

11/06/13

Dept. of ECE

12
Receiver collision

11/06/13

Dept. of ECE

13
Limited transmission power

11/06/13

Dept. of ECE

14
False misbehaviour report

11/06/13

Dept. of ECE

15
TWOACK

11/06/13

Dept. of ECE

16
Continuation....
 Acknowledgment-based
 Neither

network layer scheme

an enhancement or watch dog based scheme

 Acknowledge

every data packet transmitted over every

three consecutive nodes
 On

receiving a packet , each node is required to send

back an acknowledgment packet to the node that is two
hops away from it.
 Solves

receiver collision and limited transmission power

problem
 Network

11/06/13

overhead is present
Dept. of ECE

17
AACK
Adaptive ACKnowledgement
Acknowledgment-based

network layer

scheme
Reduce network overhead
Combination of TACK (similar to
TWOACK) and ACK
ACK-End
to end acknowledgment
scheme
11/06/13

Dept. of ECE

18
•ACK

•S will switch to TACK scheme if it doesn’t
get any ACK packet within predefined time
11/06/13

Dept. of ECE

19
The need of new IDS???
Both TWOACK

and AACK fails in

1. False misbehaviour report
2. Forged acknowledgement packet

11/06/13

Dept. of ECE

20
EAACK
Enhanced Adaptive ACKnowledgement
Efficient

and secure intrusion detection
system for MANETs
Higher malicious behaviour detection rates
with minimal effect on network performance
EAACK mechanism can be divided to three
schemes
1. ACK(end to end acknowledgement scheme)
2. S-ACK(Secure ACK)
3. MRA(Misbehaviour Report Authentication)
11/06/13

Dept. of ECE

21
1. ACK
End-to-end

acknowledgment scheme
Brings extremely low network overhead
To preserve the life cycle of battery
 Low network overhead
 Lom memory consumption

11/06/13

Dept. of ECE

22
ACK scheme

11/06/13

Dept. of ECE

23
2.S-ACK
Secure ACK
Extension

of TWOACK with digital

signature
Switch from ACK if S does not receive
any acknowledgement packet
Detect misbehaving nodes by sending SACK packet
Every three consecutive nodes work in a
group to detect misbehaving nodes
11/06/13

Dept. of ECE

24
S-ACK scheme

Who is malicious?? F1,F2 OR F3???
11/06/13

Dept. of ECE

25
NONE IS
MALICIOUS ..............
Route

is F1 F2 F3
F1 sends S-ACK data packet to F3 via the
route F2 F3
Before sending F1 store # value of data
packet and sending time
F2 receives packet from F1 and forward to
F3
F3 receives the data packet and send S-ACK
acknowledgement
◦ Contain # value and digital signature of F3

11/06/13

Dept. of ECE

26
This

S-ACKnowledgement is send back
to the reverse route
F1 receives it and verify digital signature
by computing with F3 public key.
If there is no malicious nodes ,then the
received hash value ==original hash value

11/06/13

Dept. of ECE

27
F1 IS MALICIOUS

•False misbehaviour attack
•In EAACK,it initiates MRA scheme.
11/06/13

Dept. of ECE

28
F2 IS MALICIOUS

•Digital signature of F3 is needed
•Prevent forged acknowledgement
11/06/13

Dept. of ECE

29
F3 IS MALICIOUS

•If F3 refuses to send back acknowledgement
packets, it will be marked as malicious
11/06/13

Dept. of ECE

30
3.MRA
 Misbehaviour

Report Authentication
 Designed to resolve the false misbehaviour report
attack
 Such attack can break the entire network
 Basic idea - Authenticate whether the destination node
has received the reported missing packet
 Alternate route is needed
 MRA packet is send via this alternate route
 MRA packet contains the ID of the packet that has been
reported dropped
 Destination node search if there is a match
11/06/13

Dept. of ECE

31
Continuation...
If

there is match,the report is fake and
node ,whoever sends it, is marked as
malicious
If there is no match,the report is trusted.

11/06/13

Dept. of ECE

32
EAACK SCHEME

11/06/13

Dept. of ECE

33
Performance Evaluation
Packet

delivery ratio (PDR): Ratio of
the number of packets received by the
destination node to the number of
packets sent by the source node.
Routing overhead (RO): RO defines
the ratio of the amount of routingrelated transmissions.

11/06/13

Dept. of ECE

34
Simulation configuration
Scenario

1: Malicious nodes drop all the

packets that pass through it.
Scenario

2: Set all malicious nodes to

send out false misbehavior report to the
source node whenever it is possible
Scenario

3: Provide the malicious nodes

the ability to forge acknowledgment
packets.

11/06/13

Dept. of ECE

35
11/06/13

Dept. of ECE

36
ADVANTAGES
Solves

limited transmission power and
receiver collision problem.
Capable of detecting misbehaviour attack
Ensure authentication and packet integrity
Digital signatures prevents the attack of
forge acknowledgement packets

11/06/13

Dept. of ECE

37
FUTURE ENHANCEMENT
Possibilities of adopting hybrid
cryptography techniques to further
reduce the network overhead caused by
digital signature.
Examine the possibilities of adopting a
key exchange mechanism to eliminate
the requirement of predistributed keys.
Testing the performance of EAACK in
real network environment.


11/06/13

Dept. of ECE

38
Conclusion
EAACK

makes MANETs more secure
The major threats like false mis
behaviour report and forge
acknowledgement can be detected by
using this scheme.

11/06/13

Dept. of ECE

39
REFERENCE
 EAACK—A Secure

Intrusion-Detection System for
MANETs by Elhadi M. Shakshuki, Senior Member,
IEEE, Nan Kang, and Tarek R. Sheltami, Member,
IEEE
 Detecting Misbehaving Nodes in Mobile Ad hoc
Networks by Nan Kang

11/06/13

Dept. of ECE

40
11/06/13

Dept. of ECE

41
11/06/13

Dept. of ECE

42

Más contenido relacionado

La actualidad más candente

Wba5 Sanet En Tech
Wba5 Sanet En TechWba5 Sanet En Tech
Wba5 Sanet En Tech
imec.archive
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
Imran Khan
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
Tosha Shah
 
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...
Nexgen Technology
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 

La actualidad más candente (20)

Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
50120140507006
5012014050700650120140507006
50120140507006
 
Wba5 Sanet En Tech
Wba5 Sanet En TechWba5 Sanet En Tech
Wba5 Sanet En Tech
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
2013 14-ns2-project-titles-me-mtech
2013 14-ns2-project-titles-me-mtech2013 14-ns2-project-titles-me-mtech
2013 14-ns2-project-titles-me-mtech
 
569
569569
569
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
OpenFlow Security Threat Detection and Defense Services
OpenFlow Security Threat Detection and Defense ServicesOpenFlow Security Threat Detection and Defense Services
OpenFlow Security Threat Detection and Defense Services
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor Networks
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
 
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 

Destacado

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
Jagdeep Singh
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

Destacado (15)

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manet
 
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2
 
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
 
Bat Algorithm
Bat AlgorithmBat Algorithm
Bat Algorithm
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Manet
ManetManet
Manet
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
First Review(Ppt)
First Review(Ppt)First Review(Ppt)
First Review(Ppt)
 

Similar a eaack-a secure ids for manet

Computernetworking21CS52vtunotesseminar.pptx
Computernetworking21CS52vtunotesseminar.pptxComputernetworking21CS52vtunotesseminar.pptx
Computernetworking21CS52vtunotesseminar.pptx
TejashreeSathya
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
International Journal of Technical Research & Application
 

Similar a eaack-a secure ids for manet (20)

Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKSELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
 
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok PanwarSecure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok Panwar
 
Computernetworking21CS52vtunotesseminar.pptx
Computernetworking21CS52vtunotesseminar.pptxComputernetworking21CS52vtunotesseminar.pptx
Computernetworking21CS52vtunotesseminar.pptx
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 
SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...
SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...
SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocols
 
50120140507006
5012014050700650120140507006
50120140507006
 
LTE Call Processing and Handover
LTE Call Processing and HandoverLTE Call Processing and Handover
LTE Call Processing and Handover
 
Call processing and handover.eng
Call processing and handover.engCall processing and handover.eng
Call processing and handover.eng
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.eng
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
 
Link layer, checksum, ethenet.pptx
Link layer, checksum, ethenet.pptxLink layer, checksum, ethenet.pptx
Link layer, checksum, ethenet.pptx
 
E017422935
E017422935E017422935
E017422935
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
Danger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environmentDanger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environment
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
Micro project on ARQ
Micro project on ARQMicro project on ARQ
Micro project on ARQ
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

eaack-a secure ids for manet