DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)
Abstract Distributed Denial of Service (DDoS) attacks can put the communication networks
in instability by throwing malicious traffic and requests in bulk over the network. Computer …
in instability by throwing malicious traffic and requests in bulk over the network. Computer …
Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things
The recent developments in fog computing architecture and cloud of things (CoT)
technology includes data mining management and artificial intelligence operations …
technology includes data mining management and artificial intelligence operations …
Healthcare data security using IoT sensors based on random hashing mechanism
Providing security to the healthcare data stored in an IoT‐cloud environment is one of the
most challenging and demanding tasks in recent days. Because the IoT‐cloud framework is …
most challenging and demanding tasks in recent days. Because the IoT‐cloud framework is …
Unveiling the Potential of NOMA: A Journey to Next Generation Multiple Access
The revolutionary sixth-generation wireless communications technologies and applications,
notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air …
notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air …
A multimodal facial cues based engagement detection system in e-learning context using deep learning approach
Due to the COVID-19 crisis, the education sector has been shifted to a virtual environment.
Monitoring the engagement level and providing regular feedback during e-classes is one of …
Monitoring the engagement level and providing regular feedback during e-classes is one of …
Pp-spa: privacy preserved smartphone-based personal assistant to improve routine life functioning of cognitive impaired individuals
Mobile ubiquitous computing has not only enriched human comfort but also has a deep
impact on changing standards of human daily life. Modern inventions can be even more …
impact on changing standards of human daily life. Modern inventions can be even more …
Fortifying the IoT landscape: Strategies to counter security risks in connected systems
E James, F Rabbi - Tensorgate Journal of Sustainable …, 2023 - research.tensorgate.org
The proliferation of Internet of Things (IoT) devices in our connected world has brought
unparalleled convenience and efficiency to various sectors, ranging from smart homes to …
unparalleled convenience and efficiency to various sectors, ranging from smart homes to …
[PDF][PDF] Advanced approach for encryption using advanced encryption standard with chaotic map
At present, security is significant for individuals and organizations. All information need
security to prevent theft, leakage, alteration. Security must be guaranteed by applying some …
security to prevent theft, leakage, alteration. Security must be guaranteed by applying some …
A secure multiuser privacy technique for wireless IoT networks using stochastic privacy optimization
JH Anajemba, T Yue, C Iwendi… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the exponential increase of interconnected communicating devices which make up the
Internet of Things (IoT), securing the network transmission and the fifth generation (5G) …
Internet of Things (IoT), securing the network transmission and the fifth generation (5G) …
Blockchain-secured recommender system for special need patients using deep learning
Recommender systems offer several advantages to hospital data management units and
patients with special needs. These systems are more dependent on the extreme subtle …
patients with special needs. These systems are more dependent on the extreme subtle …