Optimized machine learning-based intrusion detection system for fog and edge computing environment

OA Alzubi, JA Alzubi, M Alazab, A Alrabea, A Awajan… - Electronics, 2022 - mdpi.com
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …

OESV-KRF: Optimal ensemble support vector kernel random forest based early detection and classification of skin diseases

B Kalpana, AK Reshmy, SS Pandi… - … Signal Processing and …, 2023 - Elsevier
The most widespread disease that often puts the patient's life in danger is skin disease.
Avoiding this situation, it necessitates the development of efficient and reliable skin cancer …

A novel bi-anomaly-based intrusion detection system approach for industry 4.0

S Alem, D Espes, L Nana, E Martin… - Future Generation …, 2023 - Elsevier
Abstract Today, industry 4.0 is becoming a major target for cybercriminals due to its hyper-
connectivity. Fortunately, there are several advanced means of securing industrial systems …

Quantum Mayfly optimization with encoder-decoder driven LSTM networks for malware detection and classification model

OA Alzubi, JA Alzubi, TM Alzubi, A Singh - Mobile Networks and …, 2023 - Springer
Malware refers to malicious software developed to penetrate or damage a computer system
without any owner's informed consent. It uses target system susceptibilities, like bugs in …

[HTML][HTML] MOBIPCR: Efficient, accurate, and strict ML-based mobile malware detection

C Liu, J Lu, W Feng, E Du, L Di, Z Song - Future Generation Computer …, 2023 - Elsevier
Mobile devices have been and will be continuously prevalent as rich applications are
provided for various demands. However, the mobile operating system lacks efficient …

Hybrid IoT-edge-cloud computing-based athlete healthcare framework: Digital twin initiative

S Alsubai, M Sha, A Alqahtani, M Bhatia - Mobile Networks and …, 2023 - Springer
Abstract Internet of Things (IoT) paradigm has been able to revolutionize ubiquitous
healthcare in time-sensitive manner. Conspicuously, the current study proposes an …

Review the role of artificial intelligence in detecting and preventing financial fraud using natural language processing

P Sood, C Sharma, S Nijjer, S Sakhuja - International Journal of System …, 2023 - Springer
Frauds accounted for significant losses in the financial sector and emerged as the industry's
biggest challenge. Companies invest significant amounts to prevent such fraud. It has been …

A malicious code detection method based on stacked depthwise separable convolutions and attention mechanism

H Huang, R Du, Z Wang, X Li, G Yuan - Sensors, 2023 - mdpi.com
To address the challenges of weak model generalization and limited model capacity
adaptation in traditional malware detection methods, this article presents a novel malware …

Evolution of cooperation in vehicular cloud assisted networks for ITS services: A hunt game-based approach

NS Rajput, R Banerjee, D Sanghi… - Future Generation …, 2023 - Elsevier
Modern-day vehicles that are generally equipped with advanced sensors, devices, and
communication technologies and sophisticated cloud computing facilities paved the way for …

On the layout-oriented investigation of power attack hardness of spintronic-based logic circuits

P Iranfar, A Amirany, MH Moaiyeri, K Jafari - Circuits, Systems, and Signal …, 2024 - Springer
High leakage power consumption has become one of the main concerns of data security
protection with CMOS device scaling. Spintronic technology is one of the efficient solutions …