Abstract The term “Internet of Things”(IoT) refers to a system of networked computing devices that may work and communicate with one another without direct human intervention …
RI Abdelfatah - Journal of King Saud University-Computer and …, 2024 - Elsevier
A significant problem facing cybersecurity is that most client/server identity authentication schemes depend on computational complexity which is recently challenged by the super …
H Qi, W Zhu, M Ye, Y Hu, Y Wang - Scientific Reports, 2024 - nature.com
Due to theintricate and interdependent nature of the smart grid, it has encountered an increasing number of security threats in recent years. Currently, conventional security …
KA Awan, IU Din, A Almogren, BS Kim… - IEEE Access, 2024 - ieeexplore.ieee.org
As next-generation networking environments become increasingly complex and integral to the fabric of digital transformation as the traditional perimeter-based security model proves …
Multi-stage threats like advanced persistent threats (APT) pose severe risks by stealing data and destroying infrastructure, with detection being challenging. APTs use novel attack …
Blueberry fruit phenotypes are crucial agronomic trait indicators in blueberry breeding, and the number of fruits within the cluster, maturity, and compactness are important for …
AM Ruzbahani - arXiv preprint arXiv:2405.13831, 2024 - arxiv.org
The increasing demand for electricity, coupled with the rise in greenhouse gas emissions, necessitates the integration of Renewable Energy Sources (RESs) into power grids …
AM Ruzbahani - arXiv preprint arXiv:2405.13847, 2024 - arxiv.org
Integrating blockchain technology with the Internet of Things offers transformative possibilities for enhancing network security and privacy in the contemporary digital …
K Taghandiki, M Mohammadi - Authorea Preprints, 2024 - techrxiv.org
This paper delves into the realm of large language models (LLMs), which are potent tools within the domain of artificial intelligence, facilitating comprehensive comprehension and …