Strategies for leveraging big data and analytics for business development: a comprehensive review across sectors

NA Ochuba, OO Amoo, ES Okafor, O Akinrinola… - Computer Science & IT …, 2024 - fepbl.com
In today's data-driven world, the ability to effectively leverage big data and analytics has
become a key driver of business development across sectors. This comprehensive review …

[HTML][HTML] Privacy-preserving blockchain framework for supply chain management: Perceptive Craving Game Search Optimization (PCGSO)

B Aljabhan, MA Obaidat - Sustainability, 2023 - mdpi.com
The fierce competition in international markets and the rapid advancements in information
technology result in shorter lead times, lower transportation capacity, and higher demand …

[HTML][HTML] Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles

G Ali, MM Mijwil - Mesopotamian Journal of …, 2024 - journals.mesopotamian.press
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in
transformative advances and promising enhanced patient care, operational efficiency, and …

Data privacy and security in it: a review of techniques and challenges

OA Farayola, OL Olorunfemi, PO Shoetan - Computer Science & IT …, 2024 - fepbl.com
In today's interconnected digital world, data privacy and security have emerged as
paramount concerns for individuals, organizations, and governments alike. This review …

Digital transformation of cyber crime for chip-enabled hacking

R Rawat, V Mahor, A Rawat, B Garg… - Handbook of research on …, 2021 - igi-global.com
The heterogeneous digital arena emerged as the open depiction for malicious activities, and
cyber criminals and terrorists are targeting the cyber depiction for controlling its operation. In …

Machine learning based detection of cyber crime hub analysis using twitter data

V Mahor, R Rawat, S Telang, B Garg… - 2021 IEEE 4th …, 2021 - ieeexplore.ieee.org
Online Social Network Platform is the hub of criminal activities. Among them twitter is the
most popular one containing millions of media contents and thus can be used for crime …

[HTML][HTML] Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review

A Iftikhar, KN Qureshi, M Shiraz, S Albahli - Journal of King Saud University …, 2023 - Elsevier
High-speed networks are utilized to satisfy user demands by using cloud and edge services.
Due to the heterogeneous nature of these networks, security, trust, and privacy are the …

[HTML][HTML] Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security

H Kadry, A Farouk, EA Zanaty, O Reyad - Alexandria Engineering Journal, 2023 - Elsevier
Secure data transmission in wireless mesh networks is a necessary attribute for machine
learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse …

[HTML][HTML] Review of botnet attack detection in SDN-enabled IoT Using machine learning

WG Negera, F Schwenker, TG Debelee, HM Melaku… - Sensors, 2022 - mdpi.com
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has
revolutionized the computing fields. These include the broad spectrum of connectivity to …

Interpretable Short‐Term Electrical Load Forecasting Scheme Using Cubist

J Moon, S Park, S Rho, E Hwang - Computational intelligence …, 2022 - Wiley Online Library
Daily peak load forecasting (DPLF) and total daily load forecasting (TDLF) are essential for
optimal power system operation from one day to one week later. This study develops a …