Holistic survey on energy aware routing techniques for IoT applications

MR Poornima, HS Vimala, J Shreyas - Journal of Network and Computer …, 2023 - Elsevier
Abstract Context: The Internet of Things (IoT) is a paradigm in which real-world things are
connected to the Internet for efficient processing, control, and communication without the …

Blockchain technology for energy‐aware mobile crowd sensing approaches in Internet of Things

Z Sisi, A Souri - Transactions on Emerging Telecommunications …, 2024 - Wiley Online Library
Today, Blockchain technology is emerging to support high secured performance computing.
To improve privacy and security factors of allocate, storage, and manage resources in edge …

CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic

M Mohseni, F Amirghafouri, B Pourghebleh - Peer-to-Peer Networking and …, 2023 - Springer
Over the last decade, the Internet of Things (IoT) has received much interest from the
research and industrial communities due to its fundamental role in altering the human …

[PDF][PDF] Cybercrime Unmasked: Investigating cases and digital evidence

H Azam, MI Dulloo, MH Majeed… - … Science & Artificial …, 2023 - pdfs.semanticscholar.org
The advent of rapid digital technology has opened doors to a new domain for criminal
activities, commonly termed as computer crimes. Stringent penalties have been instituted by …

Software-defined networking-based Ad hoc networks routing protocols

G Kirubasri, S Sankar, D Pandey, BK Pandey… - … defined networking for …, 2022 - Springer
A modern networking structure that employs software-based controllers to control and
interact with primary hardware devices for directing the traffic on a network is called software …

Detecting cyber threats with a Graph-Based NIDPS

BOT Wen, N Syahriza, NCW **an, NG Wei… - … Measures for Logistics …, 2024 - igi-global.com
This chapter explores the topic of a novel network-based intrusion detection system (NIDPS)
that utilises the concept of graph theory to detect and prevent incoming threats. With …

Autonomous threat hunting: A future paradigm for AI-driven threat intelligence

SR Sindiramutty - arxiv preprint arxiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

T2FL-PSO: Type-2 fuzzy logic-based particle swarm optimization algorithm used to maximize the lifetime of Internet of Things

S Sennan, S Ramasubbareddy… - IEEE …, 2021 - ieeexplore.ieee.org
In recent years, the Internet of Things (IoT) has evolved as a research field that transforms
human lifestyle from traditional to sophisticated. In IoT, the network plays a crucial role in …

Enhancing healthcare in the digital era: A secure e-health system for heart disease prediction and cloud security

V Janarthanan, T Annamalai, M Arumugam - Expert Systems with …, 2024 - Elsevier
In the modern world, due to changing lifestyles, more people are infected by deadly
diseases, especially heart disorders. An early prognosis is the only possible way of …

Explainable AI in healthcare application

SR Sindiramutty, WJ Tee, S Balakrishnan… - … in Explainable AI …, 2024 - igi-global.com
Given the inherent risks in medical decision-making, medical professionals carefully
evaluate a patient's symptoms before arriving at a plausible diagnosis. For AI to be widely …