[HTML][HTML] Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions

A Yao, G Li, X Li, F Jiang, J Xu, X Liu - Array, 2023 - Elsevier
Fast-growing smart city applications, such as smart delivery, smart community, and smart
health, are generating big data that are widely distributed on the internet. IoT (Internet of …

A novel weight-optimized LSTM for dynamic pricing solutions in e-commerce platforms based on customer buying behaviour

S Suresh Kumar, M Margala, S Siva Shankar… - Soft Computing, 2023 - Springer
Dynamic pricing (DP) alters product prices at the ideal moment and under the ideal
conditions to boost a company's profit. Numerous third-party DP solutions are currently …

[HTML][HTML] A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities

B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …

Implementation of art therapy assisted by the internet of medical things based on blockchain and fuzzy set theory

X Lu - Information Sciences, 2023 - Elsevier
This work aims to improve the stability and efficiency of the Internet of Medical Things (IoMT),
strengthen the security and privacy of personal information, and create a healthy and safe …

Improving routing disruption attack detection in MANETs using efficient trust establishment

KAP Yamini, J Stephy, K Suthendran… - Transactions on …, 2022 - Wiley Online Library
Security is a fundamental prerequisite in self‐evolvability network and providing that in any
situation is the most problematic task as the network is highly dynamic with no trusted …

A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical images

KCP Shankar, SP Shyry - Soft Computing, 2023 - Springer
Detection of human diseases is crucial to human life. Medical Imaging helps the medical
practitioner in the process of diagnosis and treatment. Securing a medical image and …

A Novel Tunicate Swarm Algorithm With Hybrid Deep Learning Enabled Attack Detection for Secure IoT Environment

F Taher, M Elhoseny, MK Hassan… - IEEE Access, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) paradigm has matured and expanded rapidly across many
disciplines. Despite these advancements, IoT networks continue to face an increasing …

Ranking Based Routing Protocol for Residual Energy Estimation in Wireless Sensor Network Based IoT Network

SA Rashid, AJ Ahmed, MH Hassan… - … Technology and its …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is widely involved in environmental monitoring. IoT network has a
limited energy supply which impacts the network's lifetime. At present, limited energy is a …

[PDF][PDF] A survey on security challenges in the current MANET routing protocols

FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …

Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks

MS Gowtham, M Ramkumar, SS Jamaesha… - Computers & …, 2024 - Elsevier
Abstract In a Mobile Ad hoc Network (MANET), the network structure constantly evolves due
to the movement of devices, users, or nodes. The Black Hole Attack (BHA) is recognized as …