A practical model for educators to predict student performance in K-12 education using machine learning

JL Harvey, SAP Kumar - 2019 IEEE symposium series on …, 2019 - ieeexplore.ieee.org
Predicting classifiers can be used to analyze data in K-12 education. Creating a
classification model to accurately identify factors affecting student performance can be …

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network

J Rani, A Dhingra, V Sindhu - 2022 International conference on …, 2022 - ieeexplore.ieee.org
The “Internet of Things”(IoT) is internetworking of physical devices known as' things',
algorithms, equipment and techniques that allow communication with another device …

Securing digital ledger technologies-enabled IoT devices: taxonomy, challenges, and solutions

AN Bikos, SAP Kumar - IEEE Access, 2022 - ieeexplore.ieee.org
With the faster maturity and stability of digitization, connectivity and edge technologies, the
number of the Internet of Things (IoT) devices and sensors is flourishing fast in important …

[PDF][PDF] Mitigating the impact of IoT routing attacks on power consumption in IoT healthcare environment using convolutional neural network

SOM Kamel, S Abou Elhamayed - International Journal of …, 2020 - researchgate.net
IoT provides big contribution to healthcare for elderly care at home. There are many attacks
in IoT healthcare network which may destroy the entire network. A propose a framework may …

A survey of intelligent transportation systems security: challenges and solutions

J Harvey, S Kumar - 2020 IEEE 6th Intl Conference on Big Data …, 2020 - ieeexplore.ieee.org
Incorporation of intelligence is becoming an increasingly important part of the transportation
system. Attacks on the transportation infrastructure have been limited, but as more vehicles …

An evaluation of geotagged twitter data during hurricane Irma using sentiment analysis and topic modeling for disaster resilience

I Vayansky, SAP Kumar, Z Li - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
Disasters require quick response times, thought-out preparations, overall community, and
government support to ensure the prevention of loss of life and reduce possible damages …

Machine learning for predicting development of asthma in children

JL Harvey, SAP Kumar - 2019 IEEE Symposium Series on …, 2019 - ieeexplore.ieee.org
Asthma in children needs to be identified as early as possible to provide children with
medical intervention. Creating a model that accurately predicts asthma in children has …

Power analysis side channel attacks and countermeasures for the internet of things

C Liptak, S Mal-Sarkar… - 2022 IEEE Physical …, 2022 - ieeexplore.ieee.org
With the explosion in the number of internet of things (IoT) devices in recent years, the
security of these devices has become an area of major concerns across the globe …

Reinforcement learning-based anomaly detection for Internet of Things distributed ledger technology

AN Bikos, S Kumar - 2021 IEEE Symposium on Computers and …, 2021 - ieeexplore.ieee.org
Distributed Ledger Technologies (DLT) are based on the Blockchain concept and have
been specifically designed for enterprise-level devices with acceptable computing powers …