A new solution for cyber security in big data using machine learning approach

R Rawat, OA Oki, KS Sankaran, O Olasupo… - Mobile Computing and …, 2023 - Springer
The information management System works on the incident association, used to track and
identify previously established threats, and is no longer suitable due to variants in the …

Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime

R Rawat, SA AJAGBE, AOKI Olukayode - 2022 - researchsquare.com
The techniques for forecasting crime in detail before it occurs, or creating an" Automated
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …

Energy efficient load-balancing mechanism in integrated IoT–fog–cloud environment

M Vijarania, S Gupta, A Agrawal, MO Adigun… - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) and cloud computing have revolutionized the technological era
unabatedly. These technologies have impacted our lives to a great extent. The traditional …

Cyber-physical systems security: analysis, opportunities, challenges, and future prospects

JB Awotunde, YJ Oguns, KA Amuda, N Nigar… - … for Cybersecurity in …, 2023 - Springer
Abstract Cyber-Physical Systems (CPS) is an emerging technology closely related to the
Internet of Things (IoT) schemes, but CPS centers on the occurrence of computation …

Comprehensive review of load balancing in cloud computing system.

MO Oyediran, OS Ojo, SA Ajagbe… - … Journal of Electrical …, 2024 - search.ebscohost.com
Load balancing plays a critical role in optimizing resource utilization and enhancing
performance in cloud computing systems. As cloud environments grow in scale and …

[PDF][PDF] An Optimized Energy Aware Code Offloading Using Task Scheduling Algorithm for Wireless Sensor Networks

IR Idowu, K Okewale, SA Bamidele… - Research Highlights in …, 2023 - researchgate.net
Various services are provided by cloud computing in the internet-based network process.
When assigning jobs to the off-loader, code analysis and task scheduling are essential …

An Optimal Machine Learning Framework for the Enhancement of Intrusion Detection in Wireless Sensor Network Using Metaheuristic and RNS Technique

IR Idowu, AW Asaju-Gbolagade… - 2023 6th International …, 2023 - ieeexplore.ieee.org
The ability of stacking to combine models was used to detect intrusions in wireless sensor
networks (WSNs) by producing predictions that outperformed those of any individual model …

Artificial Neural Network Machine Learning Model for Malicious Action Detection and Prevention of MANET Assets

G Mani, R Prabakaran - 2024 1st International Conference on …, 2024 - ieeexplore.ieee.org
The main objective of this paper is to create a novel architecture of a machine learning
model to identify and detect the malicious attacks occur in MANET statically and …