[PDF][PDF] Security enhancement in smart vehicle using blockchain-based architectural framework

S Smys, H Wang - Journal of Artificial Intelligence, 2021 - scholar.archive.org
The concept of interconnecting smart vehicles and advancements in automotive automation
leads to beneficial outcomes, such as a reduction in road fatalities and congestion …

[PDF][PDF] Automatic vehicle license plate detection using K-means clustering algorithm and CNN

JIZ Chen, JI Zong - Journal of Electrical Engineering and …, 2021 - scholar.archive.org
Because of the development of highways as well as the increased number of vehicles
usage, much attention is required on to develop an efficient and safe intelligent …

[PDF][PDF] Security enhanced blockchain based unmanned aerial vehicle health monitoring system

JS Raj - Journal of ISMAC, 2021 - academia.edu
In this research work and unmanned aerial vehicle (UAV) that uses blockchain methodology
to collect health data from the users and saves it on a server nearby is introduced. In this …

An investigation of security risk & taxonomy of Cloud Computing environment

A Sharma, UK Singh, K Upreti… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
Since the inception of this new technology, inclusion of cloud computing in IT sectors has
grown in popularity. This is a new movement in industrial technology that will continue to …

An efficient clustering and deep learning based resource scheduling for edge computing to integrate cloud-IoT

G Vijayasekaran, M Duraipandian - Wireless Personal Communications, 2022 - Springer
Internet of things (IoT) gains wide attention in every domain due to its potential ability to
connect large number of device that generates a huge amount of data. IoT applications …

Security analysis for Sybil attack in sensor network using compare and match-position verification method

B Barani Sundaram, T Kedir, MK Mishra… - Mobile Computing and …, 2022 - Springer
Remote sensor networks are exceptionally simple to ensure organization security.
Particularly, basic assaults of different sorts are recorded in remote sensor networks by …

[PDF][PDF] Process mining error detection for securing the IoT system

S Shakya - Journal of ISMAC, 2020 - academia.edu
As the use of Internet-of-Things in day to lives increases, its connection with objects and use
of sensors has increased in number largely. These objects are also integrated with the …

Cloud Computing: Services, Deployment Models and Security Challenges

S Gupta, A Gupta, G Shankar - 2021 2nd International …, 2021 - ieeexplore.ieee.org
The period of fast improvement of data innovation has seen sensational advances in
computing storage, processing capabilities, and systems administration innovation, which …

Data obfuscation technique in cloud security

V Enireddy, K Somasundaram… - … on Smart Electronics …, 2021 - ieeexplore.ieee.org
Cloud storage, in general, is a collection of Computer Technology resources provided to
consumers over the internet on a leased basis. Cloud storage has several advantages …

Analyzing and Detecting Advanced Persistent Threat Using Machine Learning Methodology

VC Jadala, SK Pasupuleti, CHMH Sai Baba… - … : Proceedings of ICSCN …, 2022 - Springer
Advanced persistent threat is a well-organized targeted attack, which turns from passive
attack to active based on spear phishing. Due to fast technology growth and vast internet …