D Manivannan - Journal of Network and Computer Applications, 2024 - Elsevier
The significant advancements in sensors and other resource-constrained devices, capable of collecting data and communicating wirelessly, are poised to revolutionize numerous …
The 5 G networks are effectively deployed worldwide, and academia and industries have begun looking at 6 G network communication technology for consumer electronics …
Internet of Things (IoT) applications have been helping society in several ways. However, challenges still must be faced to enable efficient and secure IoT operations. In this context …
Internet of Things (IoT) applications and resources are highly vulnerable to flood attacks, including Distributed Denial of Service (DDoS) attacks. These attacks overwhelm the …
As the integration of cyber and physical components becomes increasingly prevalent in modern systems, ensuring the dependability of Cyber-Physical Systems (CPS) has emerged …
FK Vuseghesa, ML Messai… - … and Mobile Computing …, 2024 - ieeexplore.ieee.org
The emergence of the Internet of Things (IoT) networks as a source of large amount of data has paved the way for the adoption of machine learning models. Divers datasets, used in the …
K Bhatia, S Bhattacharya… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Internet of Things devices are widely employed in various industries, cities, and institutions as with low-cost investment various benefits can be obtained. The computing power …
Artificial Intelligence (AI) systems have demonstrated remarkable performance across various domains. However, their robustness remains a critical concern, particularly in terms …
AR Nair - … International Conference on Intelligent Systems for …, 2024 - ieeexplore.ieee.org
The recent surge in Internet of Things (IoT) devices has brought about unique security challenges. These devices have limited resources and are vulnerable to attacks. As Internet …