Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy
Cloud computing offers Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and
Software as a Service (SaaS) to provide compute, network, and storage capabilities to the …
Software as a Service (SaaS) to provide compute, network, and storage capabilities to the …
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …
to access linked multimedia devices. The development of IoT and its ubiquitous application …
A novel hybrid deep learning model for metastatic cancer detection
Cancer has been found as a heterogeneous disease with various subtypes and aims to
destroy the body's normal cells abruptly. As a result, it is essential to detect and prognosis …
destroy the body's normal cells abruptly. As a result, it is essential to detect and prognosis …
[HTML][HTML] An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
Cybersecurity attacks that target software have become profitable and popular targets for
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …
Federated learning inspired low-complexity intrusion detection and classification technique for sdn-based industrial cps
Unauthorized users may attack centralized controllers as an attractive target in software-
defined networking (SDN)-based industrial cyber-physical systems (CPS). Managing high …
defined networking (SDN)-based industrial cyber-physical systems (CPS). Managing high …
Deep learning enabled intrusion detection system for Industrial IOT environment
The prevalence of security vulnerabilities in Internet of Things (IoT) applications poses a
serious threat to enterprise systems, necessitating sophisticated and reliable defense …
serious threat to enterprise systems, necessitating sophisticated and reliable defense …
Review of botnet attack detection in SDN-enabled IoT Using machine learning
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has
revolutionized the computing fields. These include the broad spectrum of connectivity to …
revolutionized the computing fields. These include the broad spectrum of connectivity to …
Cognitive adaptive systems for industrial internet of things using reinforcement algorithm
Agile product development cycles and re-configurable Industrial Internet of Things (IIoT)
allow more flexible and resilient industrial production systems that can handle a broader …
allow more flexible and resilient industrial production systems that can handle a broader …
LSTM-based distributed conditional generative adversarial network for data-driven 5G-enabled maritime UAV communications
5G enabled maritime unmanned aerial vehicle (UAV) communication is one of the important
applications of 5G wireless network which requires minimum latency and higher reliability to …
applications of 5G wireless network which requires minimum latency and higher reliability to …
[HTML][HTML] Beyond encryption: Exploring the potential of physical layer security in UAV networks
Unmanned aerial vehicles (UAVs) have attracted much attention for civil and military uses
because of their high mobility and adaptable deployment capabilities in open spaces. They …
because of their high mobility and adaptable deployment capabilities in open spaces. They …