Data Security Mechanisms, Approaches, and Challenges for e-Health Smart Systems.

H Rafik, A Maizate, A Ettaoufik - International Journal of …, 2023 - search.ebscohost.com
In the new era, the trend of using wearable devices and smart accessories gained
considerable popularity and become a necessity utility for human life due to their major role …

[PDF][PDF] Deep Learning and Transfer Learning Methods to Effectively Diagnose Cervical Cancer from Liquid-Based Cytology Pap Smear Images.

L Wong, A Ccopa, E Diaz, S Valcarcel… - Int. J. Online Biomed …, 2023 - academia.edu
As cervical cancer is considered one of the leading causes of death for women globally,
different screening techniques have emerged. As the Papanicolaou technique generates …

IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks

V Shakya, J Choudhary, DP Singh - Multimedia Tools and Applications, 2024 - Springer
Abstract Wireless Sensor Networks (WSNs) play a vital role in various applications,
necessitating robust network security to protect sensitive data. Intrusion Detection Systems …

A Comprehensive Review of Cyber-Attacks Targeting IoT Systems and Their Security Measures.

ML Mutleg, AM Mahmood… - International Journal of …, 2024 - search.ebscohost.com
Abstract The Internet of Things (IoT) represents the backbone of current and future
technologies. The main objective of IoT is to make human life easier by automating most …

[HTML][HTML] Hybrid stacked autoencoder with dwarf mongoose optimization for Phishing attack detection in internet of things environment

J Aljabri, N Alzaben, N NEMRI, S Alahmari… - Alexandria Engineering …, 2024 - Elsevier
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to
this domain because of the number of IoT devices and private data they can handle. IoT …

Distributed Multiclass Cyberattack Detection using Golden Jackal Optimization with Deep Learning Model for Securing IoT Networks

FS Alrayes, N NEMRI, N Aljaffan, A Alshuhail… - IEEE …, 2024 - ieeexplore.ieee.org
Cybersecurity continues to be a significant problem for all industries involved in digital
activities, and it is specified as the cyclical surge in security occurrences. Considering more …

Attack Detection in Wireless Sensor Networks using Novel Artificial Intelligence Algorithm

A Aneja - 2023 7th International Conference on I-SMAC (IoT in …, 2023 - ieeexplore.ieee.org
The Wireless Sensor Network (WSN) is a concept of an Internet of Things network (IoT) with
limited energy resources. When many sensors are used despite their limitations, security …

Enhancing data security using Laplacian of Gaussian and Chacha20 encryption algorithm

FA Fadhil, FTA Hussien Alhilo… - Journal of Intelligent …, 2024 - degruyter.com
Concealing sensitive information inside multimedia is very interesting in secure
communication due to its wide application. This study discusses the different difficulties …

Analysis and study of IDSs for cybersecurity vulnerability detection and prevention: A Comprehensive Review

L Shaji - 2023 14th International Conference on Computing …, 2023 - ieeexplore.ieee.org
Smart environments are worried about private keys and security problems. To prevent
security attacks, which take benefit of a few of these intrusion detection systems (IDSs) and …