[HTML][HTML] Human emotions recognition, analysis and transformation by the Bioenergy Field in smart grid using image processing

G Chhabra, EM Onyema, S Kumar, M Goutham… - Electronics, 2022 - mdpi.com
The passage of electric signals throughout the human body produces an electromagnetic
field, known as the human biofield, which carries information about a person's psychological …

[HTML][HTML] Toward a comprehensive framework for ensuring security and privacy in artificial intelligence

W Villegas-Ch, J García-Ortiz - Electronics, 2023 - mdpi.com
The rapid expansion of artificial intelligence poses significant challenges in terms of data
security and privacy. This article proposes a comprehensive approach to develop a …

Machine-learning-based UAV-assisted agricultural information security architecture and intrusion detection

R Fu, X Ren, Y Li, Y Wu, H Sun… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In recent years, unmanned aerial vehicle (UAV) remote sensing has developed rapidly in
the field of farmland information monitoring. Real-time and accurate access to farmland …

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

[HTML][HTML] A modified Bayesian boosting algorithm with weight-guided optimal feature selection for sentiment analysis

S Nayak, YK Sharma - Decision Analytics Journal, 2023 - Elsevier
Sentiment analysis is crucial in understanding and analyzing public opinions, feedback, and
social media data. In this study, we propose a modified Bayesian Boosting algorithm with …

Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review

MA Bouke, A Abdullah, NI Udzir… - Journal of Communication …, 2024 - jcis.sbrt.org.br
Abstract The Internet of Things (IoT) and cloud computing are rapidly gaining momentum as
decentralized internet-based technologies and have led to an increase in information in …

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

S Dalal, UK Lilhore, N Faujdar, S Simaiya… - Journal of Cloud …, 2023 - Springer
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …

Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

L Yan, L Ge, Z Wang, G Zhang, J Xu, Z Hu - Journal of Cloud Computing, 2023 - Springer
With the rapid development of cloud computing technology, how to achieve secure access to
cloud data has become a current research hotspot. Attribute-based encryption technology …

Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers

S Afrifa, V Varadarajan, P Appiahene, T Zhang… - Eng, 2023 - mdpi.com
The transmission of information, ideas, and thoughts requires communication, which is a
crucial component of human contact. The utilization of Internet of Things (IoT) devices is a …

[HTML][HTML] A security policy protocol for detection and prevention of internet control message protocol attacks in software defined networks

EM Onyema, MA Kumar, S Balasubaramanian… - Sustainability, 2022 - mdpi.com
Owing to the latest advancements in networking devices and functionalities, there is a need
to build future intelligent networks that provide intellectualization, activation, and …