Machine Learning-powered Threat Detection: Mitigating Cybersecurity Challenges

SS Deore, AS Pawar, P Divakaran… - International Journal of …, 2024 - ijisae.org
In the field of cybersecurity, machine learning-powered threat detection has become a key
defence mechanism. This technology offers a ray of hope in an age where digital …

DIGITAL MARKETING IN THE AGE OF IOT: A REVIEW OF TRENDS AND IMPACTS

GN Okorie, CA Udeh, EM Adaga… - International Journal of …, 2024 - fepbl.com
This paper presents a comprehensive review of the evolving landscape of digital marketing
in the era of the Internet of Things (IoT). As IoT technology continues to permeate various …

STAR Antivirus Software

T Bhattacharya, S Gurrapu… - 2023 Congress in …, 2023 - ieeexplore.ieee.org
In today's IOT era, the likelihood of our machines getting infected by malicious software is
increasing every single day. The fundamental problem is that many people are unaware of …

Artificial Intelligence of Medical Things for Medical Information Systems Privacy and Security

M Abdulraheem, EA Adeniyi, JB Awotunde… - Handbook of Security …, 2024 - taylorfrancis.com
Artificial intelligence (AI) is a modern approach based on computer research that aims to
create algorithms and programs that make machines clever and effective at carrying out jobs …

Internet of Things Based Enabled Convolutional Neural Networks in Healthcare

JB Awotunde, AK Bhoi, RG Jimoh… - IoT-enabled …, 2023 - taylorfrancis.com
The Internet of Things (IoT) systems have revolutionized the medical systems with the use of
devices and sensors for the collections of data for various uses. Data is generated by these …

A security hybrid mechanism using fuzzy with adaptive ElGamal approach in cloud

R Kavitha, AT Valarmathi - Concurrency and Computation …, 2022 - Wiley Online Library
Due to the increasing number of people accessing their personal medical information
online, it has raised concerns about the security of their data. Unauthorized access to …

RFID-Based Student Identification Card Attendance Monitoring System Check for updates

JB Awotunde, SN Sur, MT Aderinto… - … Devices and Networking …, 2023 - books.google.com
Abstract Passive (low-frequency) radio-frequency identification (RFID) technology is being
used in an increasing number of contactless systems. This project presents contactless …

Introduction to Privacy Preservation and Secure Data Storage in Cloud Computing

YKK Rajnath, S Tiwari, VK Verma - Privacy Preservation and Secured …, 2023 - igi-global.com
Cloud computing has swiftly emerged as the dominant IT paradigm, revolutionizing data
storage and processing with scalable, cost-effective solutions for individuals and …

Edge computing-based containerized deep-learning approach for intrusion detection in healthcare IoT

S Prabavathy - Edge-AI in Healthcare, 2023 - taylorfrancis.com
Internet of Things (IoT) has accelerated the transformation of the healthcare sector
significantly by improving people's standard of living by leading healthier lives. Distributed …

[PDF][PDF] Measurement: Sensors

TVV Satyanarayana, YM Roopa, M Maheswari… - …, 2022 - researchgate.net
ABSTRACT The Internet of Things (IoT) was developed through information improvement
and communications technologies. As IoT technologies used in a multitude of health settings …