Systematic Review of Issues and Solutions for Security in E-commerce

RK Jamra, B Anggorojati, DI Sensuse… - 2020 International …, 2020 - ieeexplore.ieee.org
E-commerce popularity is growing rapidly all over the world, driven by technology and
customer's needs. However, the development of e-commerce is not in line with the security …

Intelligent data analytics in energy optimization for the internet of underwater things

R Arul, R Alroobaea, S Mechti, S Rubaiee, M Andejany… - Soft Computing, 2021 - Springer
The development of the Internet of Things (IoT) widened its definition to incorporate aquatic
conditions. The submarine sensor structures and intelligent underwater linked devices have …

A comparative study of frequentist vs Bayesian A/B testing in the detection of E-commerce fraud

JC Westland - Journal of Electronic Business & Digital Economics, 2022 - emerald.com
Purpose This paper tests whether Bayesian A/B testing yields better decisions that
traditional Neyman-Pearson hypothesis testing. It proposes a model and tests it using a …

Layer based security in Internet of Things: current mechanisms, prospective attacks, and future orientation

Isha, AK Luhach, S Kumar - International Conference on Smart Trends for …, 2016 - Springer
Internet of things (IoT) has now become a fascinating system that improves information
technology for its use in homes, cities and medical sectors. IoT works as an extension of …

Pioneering Security: A Hybrid Logic Framework for the Future of IoT Protection.

R Shrivastava - Journal of Cybersecurity & Information …, 2024 - search.ebscohost.com
In a complicated situation, the Internet of Things simplifies the process of connecting a wide
range of things. Because of its openness and lack of human control, the Internet of Things is …

Covering the Monitoring Network: A Unified Framework to Protect E‐Commerce Security

L Qiu, J Li - Complexity, 2017 - Wiley Online Library
Multimedia applications in smart electronic commerce (e‐commerce), such as online trading
and Internet marketing, always face security in storage and transmission of digital images …

Access Control Mechanism for Prevention of Insider Threat in Distributed Cloud Environment

G Deep, JS Sidhu, R Mohana - 2023 - ir.juit.ac.in
Cloud computing has revolutionized data storage and ensured availability of data and
storage on demand. Employees in a cloud service environment manage data storage …

Comparison of various routing and compression algorithms: a comparative study of various algorithms in wireless networking

S Preet, AK Luhach, R Luhach - International Conference on Smart Trends …, 2016 - Springer
Wireless networking is on the verge of boom these days. Many multinational companies are
trading in spectrum to provide data and voice services over wireless and mobile space. This …

Review of recent load balancing techniques in cloud computing and BAT algorithm variants

SS Abdhullah, K Jyoti, S Sharma… - 2016 3rd international …, 2016 - ieeexplore.ieee.org
Along with the advancement in the field of IT and Cloud Computing, load balancing has
become the most promising research area. Under-utilization and Over-utilization of …

Comparative analysis of Internet of Things (IoT) security models

T Siddiqui, SSB Alazzawi - International Conference on Advanced …, 2020 - Springer
Nowadays the internet of Things (IoT) is among the most trending technology to make the
world better and smart. But IoT technology is not fully matured yet and there are so many …