Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review

S Najafli, A Toroghi Haghighat, B Karasfi - Knowledge and Information …, 2024 - Springer
Abstract The Internet of Things (IoT) has been used in various aspects. Fundamental
security issues must be addressed to accelerate and develop the Internet of Things. An …

Using machine learning algorithms to enhance IoT system security

H El-Sofany, SA El-Seoud, OH Karam… - Scientific Reports, 2024 - nature.com
Abstract The term “Internet of Things”(IoT) refers to a system of networked computing
devices that may work and communicate with one another without direct human intervention …

[HTML][HTML] Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity

RI Abdelfatah - Journal of King Saud University-Computer and …, 2024 - Elsevier
A significant problem facing cybersecurity is that most client/server identity authentication
schemes depend on computational complexity which is recently challenged by the super …

Construction of power network security risk assessment model based on LSA-SVM algorithm in the background of smart grid

H Qi, W Zhu, M Ye, Y Hu, Y Wang - Scientific Reports, 2024 - nature.com
Due to theintricate and interdependent nature of the smart grid, it has encountered an
increasing number of security threats in recent years. Currently, conventional security …

Enhancing IoT Security with Trust Management Using Ensemble XGBoost and AdaBoost Techniques

KA Awan, IU Din, A Almogren, BS Kim… - IEEE Access, 2024 - ieeexplore.ieee.org
As next-generation networking environments become increasingly complex and integral to
the fabric of digital transformation as the traditional perimeter-based security model proves …

A Federated Learning Approach for Multi-stage Threat Analysis in Advanced Persistent Threat Campaigns

F Nelles, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2024 - arxiv.org
Multi-stage threats like advanced persistent threats (APT) pose severe risks by stealing data
and destroying infrastructure, with detection being challenging. APTs use novel attack …

HPPEM: A High-Precision Blueberry Cluster Phenotype Extraction Model Based on Hybrid Task Cascade

R Gai, J Gao, G Xu - Agronomy, 2024 - mdpi.com
Blueberry fruit phenotypes are crucial agronomic trait indicators in blueberry breeding, and
the number of fruits within the cluster, maturity, and compactness are important for …

Application of Internet of Energy in Smart Grids Using Deep Reinforcement Learning and Convolutional Neural Network

AM Ruzbahani - arXiv preprint arXiv:2405.13831, 2024 - arxiv.org
The increasing demand for electricity, coupled with the rise in greenhouse gas emissions,
necessitates the integration of Renewable Energy Sources (RESs) into power grids …

AI-Protected Blockchain-based IoT environments: Harnessing the Future of Network Security and Privacy

AM Ruzbahani - arXiv preprint arXiv:2405.13847, 2024 - arxiv.org
Integrating blockchain technology with the Internet of Things offers transformative
possibilities for enhancing network security and privacy in the contemporary digital …

Large Language Models Training, Challenges, Applications, and Development

K Taghandiki, M Mohammadi - Authorea Preprints, 2024 - techrxiv.org
This paper delves into the realm of large language models (LLMs), which are potent tools
within the domain of artificial intelligence, facilitating comprehensive comprehension and …