HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning

UK Lilhore, P Manoharan, S Simaiya, R Alroobaea… - Sensors, 2023 - mdpi.com
Industrial automation systems are undergoing a revolutionary change with the use of
Internet-connected operating equipment and the adoption of cutting-edge advanced …

A blockchain‐enabled security management framework for mobile edge computing

JA Alzubi, OA Alzubi, A Singh… - International Journal of …, 2023 - Wiley Online Library
Mobile edge computing (MEC) integrates mobile and edge computing technologies to
provide efficient computing services with low latency. It includes several Internet of Things …

[HTML][HTML] Blockchain consensus mechanisms comparison in fog computing: A systematic review

YI Alzoubi, A Mishra - ICT Express, 2024 - Elsevier
Numerous consensus mechanisms have been suggested to cater to the specific
characteristics of fog computing. To comprehensively understand their unique features …

Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs

X Zhang, J Lai, AJ Moshayedi - Peer-to-Peer Networking and Applications, 2023 - Springer
Vehicular ad hoc networks (VANETs) is the hotspot research field of wireless mobile ad hoc
network, it provides a new opportunity to create a safe and efficient transportation …

[HTML][HTML] Cyber security against intrusion detection using ensemble-based approaches

MN Alatawi, N Alsubaie, H Ullah Khan… - Security and …, 2023 - hindawi.com
The attacks of cyber are rapidly increasing due to advanced techniques applied by hackers.
Furthermore, cyber security is demanding day by day, as cybercriminals are performing …

Privacy‐preserving authentication scheme for digital twin‐enabled autonomous vehicle environments

CM Chen, Q Miao, S Kumar… - Transactions on Emerging …, 2023 - Wiley Online Library
Currently, the automotive industry has entered a period of considerable advancement,
shifting towards the development of safe, comfortable, and connected autonomous vehicles …

Quantum cryptography in Convolution neural network approach in Smart cities

NJ Mohammed - Journal of Survey in Fisheries Sciences, 2023 - sifisheriessciences.com
Quantum cryptography is a field that has achieved ample of attraction in lately to the
increasing need for secure communication in various applications. Smart cities are one such …

[PDF][PDF] Intrusion detection in the Internet of Things using fusion of GRU-LSTM deep learning model

MS Al-kahtani, Z Mehmood, T Sadad… - … Automation & Soft …, 2023 - researchgate.net
Cybersecurity threats are increasing rapidly as hackers use advanced techniques. As a
result, cybersecurity has now a significant factor in protecting organizational limits. Intrusion …

PFDI: a precise fruit disease identification model based on context data fusion with faster-CNN in edge computing environment

P Dhiman, P Manoharan, UK Lilhore… - EURASIP Journal on …, 2023 - Springer
Fruits significantly impact everyday living, ie, Citrus fruits. Numerous fruits have a solid
nutritious value and are packed with multivitamins and trace components. Citrus fruits are …

Cryptosystem in artificial neural network in Internet of Medical Things in Unmanned Aerial Vehicle

NJ Mohammed, MMU Hassan - Journal of Survey in …, 2023 - sifisheriessciences.com
Abstract The Internet of Medical Things (IoMT) has revolutionized the healthcare industry by
providing remote patient monitoring and real-time data analysis. Unmanned Aerial Vehicles …