Security of Internet of Things (IoT) using federated learning and deep learning—Recent advancements, issues and prospects
There is a great demand for an efficient security framework which can secure IoT systems
from potential adversarial attacks. However, it is challenging to design a suitable security …
from potential adversarial attacks. However, it is challenging to design a suitable security …
[PDF][PDF] A SYSTEM FOR ANALYSING CALL DROP DYNAMICS IN THE TELECOM INDUSTRY USING MACHINE LEARNING AND FEATURE SELECTION
D DASTAGIRAIAH - Journal of Theoretical and Applied Information …, 2024 - jatit.org
Quality of service in the telecom industry plays a vital role in the growth and economy of the
country. In India, several telecom operators provide services, and there is a regulatory …
country. In India, several telecom operators provide services, and there is a regulatory …
The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …
[HTML][HTML] Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain
R Premkumar, SS Priya - Measurement: Sensors, 2022 - Elsevier
Problem of secure transmission in cloud systems has been well studied; there exist number
of approaches discussed around the problem. Number of threats has been identified in …
of approaches discussed around the problem. Number of threats has been identified in …
Blockchain based Sensor System Design For Embedded IoT
BJ Praveena, AN, PVP Reddy - Journal of Computer Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a network of interconnected computing devices
with unique IDs and the potential to exchange data over the network. Most current IoT …
with unique IDs and the potential to exchange data over the network. Most current IoT …
Secure transmission of secret data using optimization based embedding techniques in Blockchain
Secure transmission of data is achieved through the steganography images, where the
secret data are embedded and transmitted so that the prohibited users couldn't able to …
secret data are embedded and transmitted so that the prohibited users couldn't able to …
[BOOK][B] Data classification and incremental clustering in data mining and machine learning
S Chakraborty, SH Islam, D Samanta - 2022 - Springer
This book can be recommended for any basic courses in data mining and machine learning
(ML). It can also be a very useful book for those conducting research in supervised and …
(ML). It can also be a very useful book for those conducting research in supervised and …
Approach for collision minimization and enhancement of power allocation in WSNs
Wireless sensor networks (WSNs) have attracted much more attention in recent years.
Hence, nowadays, WSN is considered one of the most popular technologies in the …
Hence, nowadays, WSN is considered one of the most popular technologies in the …
Optimizing Agricultural Risk Management with Hybrid Block-Chain and Fog Computing Architectures for Secure and Efficient Data Handling
This study integrates risk management optimization in the meaningful agricultural sector,
which is an important aspect of the modern farming systems. Whilst agriculture is witnessing …
which is an important aspect of the modern farming systems. Whilst agriculture is witnessing …
A secure network with minimization of energy for e-healthcare application in iomt
R Aluvalu, UM V, Y Balagoni - Recent Patents on Engineering, 2024 - benthamdirect.com
Aims: Protect patient healthcare records. Background: The adaptability of the digital
healthcare system is a major factor in its recent rise in popularity. Utilizing the digital …
healthcare system is a major factor in its recent rise in popularity. Utilizing the digital …