A new solution for cyber security in big data using machine learning approach
The information management System works on the incident association, used to track and
identify previously established threats, and is no longer suitable due to variants in the …
identify previously established threats, and is no longer suitable due to variants in the …
Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime
The techniques for forecasting crime in detail before it occurs, or creating an" Automated
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …
Energy efficient load-balancing mechanism in integrated IoT–fog–cloud environment
The Internet of Things (IoT) and cloud computing have revolutionized the technological era
unabatedly. These technologies have impacted our lives to a great extent. The traditional …
unabatedly. These technologies have impacted our lives to a great extent. The traditional …
Cyber-physical systems security: analysis, opportunities, challenges, and future prospects
Abstract Cyber-Physical Systems (CPS) is an emerging technology closely related to the
Internet of Things (IoT) schemes, but CPS centers on the occurrence of computation …
Internet of Things (IoT) schemes, but CPS centers on the occurrence of computation …
Comprehensive review of load balancing in cloud computing system.
Load balancing plays a critical role in optimizing resource utilization and enhancing
performance in cloud computing systems. As cloud environments grow in scale and …
performance in cloud computing systems. As cloud environments grow in scale and …
[PDF][PDF] An Optimized Energy Aware Code Offloading Using Task Scheduling Algorithm for Wireless Sensor Networks
IR Idowu, K Okewale, SA Bamidele… - Research Highlights in …, 2023 - researchgate.net
Various services are provided by cloud computing in the internet-based network process.
When assigning jobs to the off-loader, code analysis and task scheduling are essential …
When assigning jobs to the off-loader, code analysis and task scheduling are essential …
An Optimal Machine Learning Framework for the Enhancement of Intrusion Detection in Wireless Sensor Network Using Metaheuristic and RNS Technique
The ability of stacking to combine models was used to detect intrusions in wireless sensor
networks (WSNs) by producing predictions that outperformed those of any individual model …
networks (WSNs) by producing predictions that outperformed those of any individual model …
Artificial Neural Network Machine Learning Model for Malicious Action Detection and Prevention of MANET Assets
G Mani, R Prabakaran - 2024 1st International Conference on …, 2024 - ieeexplore.ieee.org
The main objective of this paper is to create a novel architecture of a machine learning
model to identify and detect the malicious attacks occur in MANET statically and …
model to identify and detect the malicious attacks occur in MANET statically and …