State-of-the-art artificial intelligence techniques for distributed smart grids: A review

SS Ali, BJ Choi - Electronics, 2020 - mdpi.com
The power system worldwide is going through a revolutionary transformation due to the
integration with various distributed components, including advanced metering infrastructure …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

A proposal for distinguishing between bacterial and viral meningitis using genetic programming and decision trees

G D'Angelo, R Pilla, C Tascini, S Rampone - Soft Computing, 2019 - Springer
Meningitis is an inflammation of the protective membranes covering the brain and the spinal
cord. Meningitis can have different causes, and discriminating between meningitis etiologies …

Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification

G D'Angelo, S Rampone, F Palmieri - Soft Computing, 2017 - Springer
Pervasive computing is one of the latest and more advanced paradigms currently available
in the computers arena. Its ability to provide the distribution of computational services within …

Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems

G D'Angelo, F Palmieri - Future Generation Computer Systems, 2020 - Elsevier
In non-destructive testing of aerospace structures' defects, the tests reliability is a crucial
issue for guaranteeing security of both aircrafts and passengers. Most of the widely …

Malicious attacks detection using GRU-BWFA classifier in pervasive computing

P Rajasekaran, V Magudeeswaran - Biomedical Signal Processing and …, 2023 - Elsevier
With the advanced trends in pervasive computing, the data users were subjected to face
different kinds of attacks. Several algorithms for attack detection was performed with minimal …

Detecting unfair recommendations in trust-based pervasive environments

G D'Angelo, F Palmieri, S Rampone - Information Sciences, 2019 - Elsevier
In pervasive/ubiquitous computing environments, interacting users may evaluate their
respective trustworthiness by using historical data coming from their past interactions …

Developing an efficient deep learning‐based trusted model for pervasive computing using an LSTM‐based classification model

Y He, S Nazir, B Nie, S Khan, J Zhang - Complexity, 2020 - Wiley Online Library
Mobile and pervasive computing is one of the recent paradigms available in the area of
information technology. The role of pervasive computing is foremost in the field where it …

[HTML][HTML] iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems

S Azad, M Mahmud, KZ Zamli, MS Kaiser… - Expert Systems with …, 2024 - Elsevier
To meet the demand of the world's largest population, smart manufacturing has accelerated
the adoption of smart factories—where autonomous and cooperative instruments across all …

Security in the internet of things: botnet detection in software-defined networks by deep learning techniques

I Letteri, GD Penna… - International Journal of …, 2019 - inderscienceonline.com
The diffusion of the internet of things (IoT) is making cyber-physical smart devices an
element of everyone's life, but also exposing them to malware designed for conventional …