Financial fraud detection using quantum graph neural networks

N Innan, A Sawaika, A Dhor, S Dutta, S Thota… - Quantum Machine …, 2024 - Springer
Financial fraud detection is essential for preventing significant financial losses and
maintaining the reputation of financial institutions. However, conventional methods of …

Enhanced cyber attack detection process for internet of health things (IoHT) devices using deep neural network

KP Vijayakumar, K Pradeep, A Balasundaram… - Processes, 2023 - mdpi.com
Internet of Health Things plays a vital role in day-to-day life by providing electronic
healthcare services and has the capacity to increase the quality of patient care. Internet of …

A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022 - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

A deep learning method for lightweight and cross-device IoT botnet detection

M Catillo, A Pecchia, U Villano - Applied Sciences, 2023 - mdpi.com
Ensuring security of Internet of Things (IoT) devices in the face of threats and attacks is a
primary concern. IoT plays an increasingly key role in cyber–physical systems. Many …

Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

P Shukla, CR Krishna, NV Patil - The Journal of Supercomputing, 2024 - Springer
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …

Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review

J Asim, AS Khan, RM Saqib, J Abdullah, Z Ahmad… - Applied Sciences, 2022 - mdpi.com
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …

Optimization of clustering in wireless sensor networks: techniques and protocols

AM Jubair, R Hassan, AHM Aman, H Sallehudin… - Applied Sciences, 2021 - mdpi.com
Recently, Wireless Sensor Network (WSN) technology has emerged extensively. This began
with the deployment of small-scale WSNs and progressed to that of larger-scale and Internet …

Network intrusion detection system: a survey on artificial intelligence‐based techniques

MS Habeeb, TR Babu - Expert Systems, 2022 - Wiley Online Library
High data rate requirements in recent years have resulted in the massive expansion of
communication systems, network size and the amount of data generated and processed …

Lightweight multifactor authentication scheme for nextgen cellular networks

AS Khan, Y Javed, RM Saqib, Z Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
With increased interest in 6G (6th Generation) cellular networks that can support intelligently
small-cell communication will result in effective device-to-device (D2D) communication. High …

Identification and prediction of attacks to industrial control systems using temporal point processes

G Fortino, C Greco, A Guzzo, M Ianni - Journal of Ambient Intelligence and …, 2023 - Springer
The task of identifying malicious activities in logs and predicting threats is crucial nowadays
in industrial sector. In this paper, we focus on the identification of past malicious activities …