[HTML][HTML] An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0

O Chakir, A Rehaimi, Y Sadqi, M Krichen… - Journal of King Saud …, 2023 - Elsevier
Cybersecurity attacks that target software have become profitable and popular targets for
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …

[HTML][HTML] A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks

AK Dey, GP Gupta, SP Sahu - Decision Analytics Journal, 2023 - Elsevier
Abstract Internet of Things (IoT) enabled networks are highly vulnerable to cyber threats due
to insecure wireless communication, resource constraint architecture, different types of IoT …

Blockchain-based authentication and explainable ai for securing consumer iot applications

R Kumar, D Javeed, A Aljuhani, A Jolfaei… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The consumer Internet of Things (IoT) applications in particular smart cities are mostly
equipped with Internet-connected networked devices to improve city operations by giving …

[HTML][HTML] Digital twins-enabled zero touch network: A smart contract and explainable AI integrated cybersecurity framework

R Kumar, A Aljuhani, D Javeed, P Kumar… - Future Generation …, 2024 - Elsevier
Data-driven modeling using Artificial Intelligence (AI) is envisioned as a key enabling
technology for Zero Touch Network (ZTN) management. Specifically, AI has shown huge …

[HTML][HTML] Futuristic hospitality conceptualized: DASH-Decentralized Autonomous and Smart Hotel system

S Aggarwal, A Mittal - Journal of Open Innovation: Technology, Market, and …, 2024 - Elsevier
Ubiquitous hospitality has stimulated a rise in expeditions to inspiring getaways and
extraordinary destinations. It is imperative for hotels to create a distinct and immersive …

A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning

Z Li, Q Chen, J Li, J Huang, W Mo, DS Wong… - Computer Standards & …, 2024 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) are highly versatile and efficient tools utilized
across diverse industries for data collection. However, they are vulnerable to wireless …

Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach

SK Jagatheesaperumal, M Rahouti, K Xiong… - arXiv preprint arXiv …, 2023 - arxiv.org
Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have evolved into
indispensable tools for effectively managing disasters and responding to emergencies. For …

Secure and Privacy-Preserving Framework for IoT-Enabled Smart Grid Environment

C Kumar, P Chittora - Arabian Journal for Science and Engineering, 2024 - Springer
Due to recent technical breakthroughs in wireless communication and the Internet of Things
(IoT), the smart grid (SG) has been recognized as a next-generation network for intelligent …

Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology

A Khandekar, SF Ahmad - Cluster Computing, 2024 - Springer
Abstract The Internet of Things (IoT), the convergence of blockchain and deep learning (DL)
technologies presents exciting opportunities for innovation. The integration of a secured IoT …

Design of a Hybrid Bioinspired Deep Learning Model for Identification of Heart Diseases Using Clinical Parameters

D Kulkarni, R Soni - SN Computer Science, 2023 - Springer
There has been an exponential increase in heart diseases due to an imbalanced diet,
improper lifestyle, and abnormal clinical parameters. The majority of the models that …