An IOT-Based Automotive and Intelligent Toll Gate Using RFID

S Chandrappa, MS Guruprasad, HNN Kumar… - SN Computer …, 2023 - Springer
The automated toll collection system is a relatively recent piece of technology that has the
potential to collect tolls in a manner that is both more efficient and expedient. It is an …

Comparative study of AI-enabled DDoS detection technologies in SDN

KM Ko, JM Baek, BS Seo, WB Lee - Applied Sciences, 2023 - mdpi.com
Software-defined networking (SDN) is becoming the standard for the management of
networks due to its scalability and flexibility to program the network. SDN provides many …

Exploitation of machine learning algorithms for detecting financial crimes based on customers' behavior

S Kumar, R Ahmed, S Bharany, M Shuaib, T Ahmad… - Sustainability, 2022 - mdpi.com
Longer-term projections indicate that today's developing and rising nations will account for
roughly 60% of the global GDP by 2030. There is tremendous financial growth and …

Exploring the Connectivity Between Education 4.0 and Classroom 4.0: Technologies, Student Perspectives, and Engagement in the Digital Era

K Joshi, R Kumar, S Bharany, DKJB Saini… - IEEE …, 2024 - ieeexplore.ieee.org
The democratic welfare government is equally committed to quality-driven, impartial, and
egalitarian education. The major contribution of this study is to examine the problems and …

A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field

FM Alotaibi, A Al-Dhaqm, WMS Yafooz, YD Al-Otaibi - Applied Sciences, 2023 - mdpi.com
Information security policy (ISP) plays a crucial role in maintaining the availability,
confidentiality, and integrity of sensitive data. However, it is of high complexity and …

Real-Time Cost Optimization Approach Based on Deep Reinforcement Learning in Software-Defined Security Middle Platform

Y Li, Y Qin - Information, 2023 - mdpi.com
In today's business environment, reducing costs is crucial due to the variety of Internet of
Things (IoT) devices and security infrastructure. However, applying security measures to …

A Comparative Analysis of Feature Eliminator Methods to Improve Machine Learning Phishing Detection

J Tanimu, S Shiaeles, M Adda - Journal of Data Science and …, 2024 - ojs.bonviewpress.com
This Machine-learning-based phishing detection employs statistical models and algorithms
to assess and recognise phishing attacks. These algorithms can learn patterns and features …

FEAROL: Aging flow entries based on local staircase randomized response for secure SDN flow tables

LX Liao, X Ma, C Zhao, Z Li, HC Chao - Applied Sciences, 2023 - mdpi.com
Software-Defined Networking (SDN) systems are sensitive to the lifespans of flow entries in
flow tables as such lifespans affect the overall network-forwarding latency and the flow table …

Improved Neural Differential Distinguisher Model for Lightweight Cipher Speck

X Yue, W Wu - Applied Sciences, 2023 - mdpi.com
At CRYPTO 2019, Gohr proposed the neural differential distinguisher using the residual
network structure in convolutional neural networks on round-reduced Speck32/64. In this …

A Comparative Study of Cloud Data Portability Frameworks for Analyzing Object to NoSQL Database Mapping from ONDM's Perspective

S Bharany, K Kaur, SEM Eltaher… - International …, 2023 - search.proquest.com
Cloud computing revolves around storing and retrieving data in a portable manner.
However, practical data portability across multiple Database-as-a-service (DBaaS) cloud …