[HTML][HTML] Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Despite providing unparalleled connectivity and convenience, the exponential growth of the
Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These …
Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These …
A systematic analysis of enhancing cyber security using deep learning for cyber physical systems
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration
in various fields because of their emergent applications. Though the robust dependence on …
in various fields because of their emergent applications. Though the robust dependence on …
An innovative multi-agent approach for robust cyber–physical systems using vertical federated learning
Federated learning presents a compelling approach to training artificial intelligence systems
in decentralized settings, prioritizing data safety over traditional centralized training …
in decentralized settings, prioritizing data safety over traditional centralized training …
Trustworthy Artificial Intelligence Methods for Users' Physical and Environmental Security: A Comprehensive Review
Artificial Intelligence is an indispensable element of the modern world, constantly evolving
and contributing to the emergence of new technologies. We meet it in everyday applications …
and contributing to the emergence of new technologies. We meet it in everyday applications …
Revolutionizing finance and travel with ai: impacting through machine learning models
D Mittal, VE Raj, V Kumar - Proceedings of the 2023 Fifteenth …, 2023 - dl.acm.org
Subsiding in the world of technical savvy where machine learning, is at leisure. As the
inclination has been externalized towards finance in terms of use cases such as the travel …
inclination has been externalized towards finance in terms of use cases such as the travel …
Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted Domains
Quantum computers use quantum-mechanical phenomena for knowledge manipulation and
depend on quantum bits or qubits. A qubit can be created in several different ways, and out …
depend on quantum bits or qubits. A qubit can be created in several different ways, and out …
Robust IoT Botnet Detection Framework Resilient to Gradient Based Adversarial Attacks
D Krishnan, P Shrinath - SN Computer Science, 2024 - Springer
The exponential growth of Internet of Things (IoT) devices has led to an escalation in the
number of possible points of attack, making IoT networks vulnerable to a diverse range of …
number of possible points of attack, making IoT networks vulnerable to a diverse range of …
A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems
E Ozdogan - IEEE Access, 2024 - ieeexplore.ieee.org
In this study, machine learning algorithms in IoT IDS (Internet of Things Intrusion Detection
System) systems are comprehensively compared from various aspects. Accuracy, precision …
System) systems are comprehensively compared from various aspects. Accuracy, precision …
[PDF][PDF] Advancements in enhancing cyber-physical system security: Practical deep learning solutions for network traffic classification and integration with security …
Traditional network analysis frequently relied on manual examination or predefined patterns
for the detection of system intrusions. As soon as there was increase in the evolution of the …
for the detection of system intrusions. As soon as there was increase in the evolution of the …
AI for Tourism: Pioneering New Frontiers in the Industry
The conversational agents or chatbots have become a part of our everyday life and are
designed to make our life easier. Recent advancements in natural language processing and …
designed to make our life easier. Recent advancements in natural language processing and …