Wireless Technology Security and Privacy: A Comprehensive Study

H Azam, M Tan, LT Pin, MA Syahmi, ALW Qian… - 2023 - preprints.org
Since the advent of the Internet, there has been a significant shift from wired to wireless
communication between devices. The volume of data transmitted has surged, primarily …

Internet of Things (IoT) Impact on Inventory Management: A Review

A Khan, NZ Jhanjhi, DHTBA Haji… - … Measures for Logistics …, 2024 - igi-global.com
The impact of the internet of things (IoT) on inventory management is explored in this
chapter. The chapter discusses comprehensively IoT system components, communication …

Securing the digital supply chain cyber threats and vulnerabilities

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Measures for Logistics …, 2024 - igi-global.com
The digital supply chain has become an integral part of modern business operations,
enabling efficient and streamlined processes. However, with the rapid advancement of …

[PDF][PDF] Cybercrime Unmasked: Investigating cases and digital evidence.

H Azam, MI Dulloo, MH Majeed… - … Science & Artificial …, 2023 - pdfs.semanticscholar.org
The advent of rapid digital technology has opened doors to a new domain for criminal
activities, commonly termed as computer crimes. Stringent penalties have been instituted by …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

Optimization of network topology robustness in IoTs: A systematic review

SA Changazi, AD Bakhshi, M Yousaf, SM Mohsin… - Computer Networks, 2024 - Elsevier
Abstract Internet of Things (IoT) has emerged as one of the most promising technologies of
the modern era, enabling connectivity between devices and systems for efficient data …

A position and energy aware multi-objective controller placement and re-placement scheme in distributed SDWSN

A Narwaria, K Soni, AP Mazumdar - The Journal of Supercomputing, 2024 - Springer
The software-defined network paradigm, ensembled with a wireless sensor network, has
emerged as a promising phenomenon to enable multi-tasking, re-configuration, and …

Comparison of exposure to various research methodologies, willingness, and involvement of undergraduate students in research projects between Indian and …

P Sinduja, R Priyadharshini - 2023 International Conference …, 2023 - ieeexplore.ieee.org
Evidence-based medicine is a crucial component of medical decision-making and calls for
an awareness of and application of scientific methodologies and ideas. The research …

Enhancing power utilization analysis: detecting aberrant patterns of electricity consumption

Y Qian, Y Wang, J Shao - Electrical Engineering, 2024 - Springer
Detection of abnormal power consumption is very important to reduce irregular power
consumption and economic losses. To reduce power wastage, it is necessary to understand …

Cybersecurity Measures for Logistics Industry

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Cyber Threats and …, 2024 - igi-global.com
The logistics sector plays a crucial role in the worldwide economy by facilitating the efficient
and punctual transportation of commodities and services. Nevertheless, the growing …