[Retracted] IoT‐Enabled Framework for Early Detection and Prediction of COVID‐19 Suspects by Leveraging Machine Learning in Cloud

MH Mir, S Jamwal, A Mehbodniya… - Journal of healthcare …, 2022 - Wiley Online Library
COVID‐19 is the repugnant but the most searched word since its outbreak in November
2019 across the globe. The world has to battle with it until an effective solution is developed …

[Retracted] Homogeneous Decision Community Extraction Based on End‐User Mental Behavior on Social Media

S Gupta, S Kumar, SL Bangare… - Computational …, 2022 - Wiley Online Library
Aiming at the inadequacy of the group decision‐making method with the current attribute
value as interval language information, an interval binary semantic decision‐making method …

An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC

U Chatterjee, S Ray, S Adhikari, MK Khan… - Computer …, 2023 - Elsevier
Wireless sensor network (WSN) is used for sensing data/information from the nearby
environment with the help of various spatially dispersed miniature sensor devices/nodes …

[Retracted] Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications

S Raghavendra, P Srividya, M Mohseni… - Security and …, 2022 - Wiley Online Library
Using cloud computing, businesses can adopt IT without incurring a significant upfront cost.
The Internet has numerous benefits, but model security remains a concern, which affects …

[Retracted] Decentralized Consensus Blockchain and IPFS‐Based Data Aggregation for Efficient Data Storage Scheme

G Subathra, A Antonidoss… - Security and …, 2022 - Wiley Online Library
By the development and advancement of blockchain technique, Internet of Things (IoT)
proliferation driven devices and the application of blockchain‐enabled IoT alter the view and …

A novel secure authentication protocol for IoT and cloud servers

U Iqbal, A Tandon, S Gupta, AR Yadav… - Wireless …, 2022 - Wiley Online Library
The integration of IoT with the cloud infrastructure is essential for designing smart
applications. However, such integration may lead to security issues. Authentication and …

[HTML][HTML] GDE model: A variable intrusion detection model for few-shot attack

Y Yan, Y Yang, F Shen, M Gao, Y Gu - Journal of King Saud University …, 2023 - Elsevier
With the formation and popularity of the Internet of Things (IoT), the difficulty of protecting IoT
infrastructure and smart devices from a few-shot of ever-changing malicious attacks has …

Secure and scalable access control protocol for IoT environment

U Iqbal, AH Mir - Internet of Things, 2020 - Elsevier
Smart applications based on IoT has gained huge momentum in recent times. Typically,
these applications involve the deployment of smart devices within the perception layer of …

Retracted: Object detection and recognition using deep learning‐based techniques

P Sharma, S Gupta, S Vyas, M Shabaz - IET Communications, 2023 - Wiley Online Library
The above article from IET Communications, published online on 17 October 2022 in Wiley
Online Library (wileyonlinelibrary. com), has been retracted by agreement between the …

Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones.

MA Dar, A Askar, D Alyahya… - International Journal of …, 2021 - search.ebscohost.com
Open networks enable data communication between different types of mobile devices that
showcase the need to enforce elevated security measures. Securing sensitive or …