[HTML][HTML] Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security

H Kadry, A Farouk, EA Zanaty, O Reyad - Alexandria Engineering Journal, 2023 - Elsevier
Secure data transmission in wireless mesh networks is a necessary attribute for machine
learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse …

Privacy-Preserving Big Data Security for IoT With Federated Learning and Cryptography

KA Awan, IU Din, A Almogren, JJPC Rodrigues - IEEE Access, 2023 - ieeexplore.ieee.org
In the ever-expanding Internet of Things (IoT) domain, the production of data has reached an
unparalleled scale. This massive data is processed to glean invaluable insights …

[PDF][PDF] Security of Big Data over IoT Environment by Integration of Deep Learning and Optimization

NN Alleema, R Raman, F Castro-Cayllahua… - International Journal of …, 2022 - academia.edu
This is especially true given the spread of IoT, which makes it possible for two-way
communication between various electronic devices and is therefore essential to …

The connection privacy management model to enhance the communication services for subscriber neighboring cells in Cellular communication

A Gautam, R Sharma - 2022 International Interdisciplinary …, 2022 - ieeexplore.ieee.org
Cellular communication has recently become so firmly established in our everyday life that it
is difficult to imagine modern society without it. Like many great inventions, the mobile phone …

Analysis of the Integration of 5G with Artificial Intelligence

PS Gaur, D Rastogi - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
All as it proceeds to create and is progressively executed in a rising number of settings, this
innovation will ultimately develop to where it will cause a change in outlook, moving away …

A comparative study of Artificial Intelligence and machine learning in 5G innovation

S Srinivasan, AK Singh - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
4G/LTE (Long Term Evolution) mobile network deployment has addressed the high capacity
problem to establish genuine broadband mobile Internet. 5G has overcome some of these …

The Intelligent Securely Storing Data in Distributed Systems for Big Data

NK Thakre, C Venkatesh, SKG Pisconte… - … on Power Energy …, 2023 - ieeexplore.ieee.org
Massive records afford an ever-developing task of securely storing facts. For disbursed
structures, deploying a mechanism in which the facts are securely saved and available from …

[PDF][PDF] Enhancing the IoT by incorporating 5G Technology

N Shahani - Journal Homepage: http://www. ijmra. us, 2024 - researchgate.net
The primary goal of this dissertation is to understand how to enhance the Internet of Things
by incorporating fifth-generation technology, which is increasing daily. As a result, it is critical …

Exploring IoT Frameworks: An In-Depth Analysis and Survey of Security Protocols

NR Chandrika, DL Arya - Available at SSRN 4746559, 2024 - papers.ssrn.com
The security issues associated with IoT applications are often not properly addressed due to
the complexity of the IoT threat landscape. One of the most critical factors that can be …

Streamlining Information Capture and Retrieval with AI-Enabled Systems

G Sudhamsu, A Agarwal, R Dhivrani… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
artificial intelligence (AI) is an emerging era that has proven to have a fantastic capacity to
revolutionize how facts are captured and retrieved. AI-enabled systems offer an expansion …