Security of Internet of Things (IoT) using federated learning and deep learning—Recent advancements, issues and prospects

V Gugueoth, S Safavat, S Shetty - ICT Express, 2023 - Elsevier
There is a great demand for an efficient security framework which can secure IoT systems
from potential adversarial attacks. However, it is challenging to design a suitable security …

[PDF][PDF] A SYSTEM FOR ANALYSING CALL DROP DYNAMICS IN THE TELECOM INDUSTRY USING MACHINE LEARNING AND FEATURE SELECTION

D DASTAGIRAIAH - Journal of Theoretical and Applied Information …, 2024 - jatit.org
Quality of service in the telecom industry plays a vital role in the growth and economy of the
country. In India, several telecom operators provide services, and there is a regulatory …

The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arxiv preprint arxiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

[HTML][HTML] Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain

R Premkumar, SS Priya - Measurement: Sensors, 2022 - Elsevier
Problem of secure transmission in cloud systems has been well studied; there exist number
of approaches discussed around the problem. Number of threats has been identified in …

Blockchain based Sensor System Design For Embedded IoT

BJ Praveena, AN, PVP Reddy - Journal of Computer Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a network of interconnected computing devices
with unique IDs and the potential to exchange data over the network. Most current IoT …

Secure transmission of secret data using optimization based embedding techniques in Blockchain

I Benkhaddra, A Kumar, ZEA Bensalem… - Expert Systems with …, 2023 - Elsevier
Secure transmission of data is achieved through the steganography images, where the
secret data are embedded and transmitted so that the prohibited users couldn't able to …

[BOOK][B] Data classification and incremental clustering in data mining and machine learning

S Chakraborty, SH Islam, D Samanta - 2022 - Springer
This book can be recommended for any basic courses in data mining and machine learning
(ML). It can also be a very useful book for those conducting research in supervised and …

Approach for collision minimization and enhancement of power allocation in WSNs

D Singh, J Bhanipati, AK Biswal, D Samanta… - Journal of …, 2021 - Wiley Online Library
Wireless sensor networks (WSNs) have attracted much more attention in recent years.
Hence, nowadays, WSN is considered one of the most popular technologies in the …

Optimizing Agricultural Risk Management with Hybrid Block-Chain and Fog Computing Architectures for Secure and Efficient Data Handling

JA Malik, A Hussain, H Shah, M Saleem… - … Intelligence in Internet …, 2024 - Springer
This study integrates risk management optimization in the meaningful agricultural sector,
which is an important aspect of the modern farming systems. Whilst agriculture is witnessing …

A secure network with minimization of energy for e-healthcare application in iomt

R Aluvalu, UM V, Y Balagoni - Recent Patents on Engineering, 2024 - benthamdirect.com
Aims: Protect patient healthcare records. Background: The adaptability of the digital
healthcare system is a major factor in its recent rise in popularity. Utilizing the digital …