A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …

A review of industry 4.0 revolution potential in a sustainable and renewable palm oil industry: HAZOP approach

CH Lim, S Lim, BS How, WPQ Ng, SL Ngan… - … and Sustainable Energy …, 2021 - Elsevier
Palm oil is a renewable resource that has the potential to replace fossil fuel and
petrochemical for a better sustainable system. However, there is room for improvement in …

A new solution for cyber security in big data using machine learning approach

R Rawat, OA Oki, KS Sankaran, O Olasupo… - Mobile Computing and …, 2023 - Springer
The information management System works on the incident association, used to track and
identify previously established threats, and is no longer suitable due to variants in the …

Trustworthy and sustainable smart city services at the edge

Y Jararweh, S Otoum, I Al Ridhawi - Sustainable Cities and Society, 2020 - Elsevier
The proliferation of smart city and Internet of Things (IoT) applications has introduced
numerous challenges related to network performance, reliability, and security. Moreover, the …

Federated learning in cloud-edge collaborative architecture: key technologies, applications and challenges

G Bao, P Guo - Journal of Cloud Computing, 2022 - Springer
In recent years, with the rapid growth of edge data, the novel cloud-edge collaborative
architecture has been proposed to compensate for the lack of data processing power of …

[PDF][PDF] MobileNet based secured compliance through open web application security projects in cloud system

R Vallabhaneni, SA Vaddadi, S Pillai… - Indonesian Journal of …, 2024 - researchgate.net
The daunting issues that are promptly faced worldwide are the sophisticated cyber-attacks in
all kinds of organizations and applications. The development of cloud computing pushed …

[HTML][HTML] Boosting cyber-threat intelligence via collaborative intrusion detection

M Guarascio, N Cassavia, FS Pisani… - Future Generation …, 2022 - Elsevier
Sharing threat events and Indicators of Compromise (IoCs) enables quick and crucial
decision making relative to effective countermeasures against cyberattacks. However, the …

Chronological salp swarm algorithm based deep belief network for intrusion detection in cloud using fuzzy entropy

L Karuppusamy, J Ravi, M Dabbu… - … Journal of Numerical …, 2022 - Wiley Online Library
Cloud computing is susceptible to the existing information technology attacks, as it extends
and uses the traditional operating system, information technology infrastructure, and …

Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …

The nature of law

C de Silva - Galbraith's Construction and Land Management Law …, 2020 - taylorfrancis.com
Any society quickly finds that it needs rules or laws to enable it to function smoothly.
Consider the results if you had decided to drive to work today on the right instead of the left …