[PDF][PDF] An Investigation of Pseudonymization Techniques in Decentralized Transactions.

S Rahmadika, M Firdaus, YH Lee… - J. Internet Serv. Inf …, 2021 - researchgate.net
Decentralized learning (DL) enables several devices to assemble deep learning models
while keeping their private training data on the device. Rather than uploading the training …

Fingerprint defender: defense against browser-based user tracking

D Moad, V Sihag, G Choudhary, DG Duguma… - … Symposium on Mobile …, 2021 - Springer
It is difficult to be anonymous online with user activities always under the scanner. Multiple
identifiers and their combinatories are used for user identification. While browsing, trackers …

Securing Smart City Services in Cyber-Physical Systems using the computation annealed selection process

A Saad, A Alharbi - … Journal of Foundations of Computer Science, 2022 - World Scientific
Cyber-physical systems in a smart city environment offer secure computations in addition to
robust resources and secure information exchanges. From the security aspect, the selection …

Machine learning and big data in cyber‐physical system: methods, applications and challenges

J Nayak, PS Kumar, DKK Reddy… - … engineering for next …, 2021 - Wiley Online Library
One of the most considerable and emerging methodologies, defined by the integration of
physical and computational processes as cyber‐physical systems. These systems are …

Context-aware anomaly detection for the distributed data validation network in industry 4.0 environments

K Wallis, F Schillinger, E Backmund… - 2020 Fourth World …, 2020 - ieeexplore.ieee.org
In the Industry 4.0 context, especially when considering large factories producing costly
goods, monitoring sensor values is important to ensure high quality. This reduces large …

Water moth search algorithm-based deep training for intrusion detection in IoT

NH Shahapure, M Punitha - Journal of Web Engineering, 2021 - ieeexplore.ieee.org
The economic growth and information technology leads to the development of Internet of
Things (IoT) industry and has become the emerging field of research. Several intrusion …

[PDF][PDF] Intelligent system for intrusion detection in internet of things-wireless sensor network (IoT-WSN) smart environment

G Kalnoor, S Gowrishankar - 2021 - academia.edu
Technology, as we know, has aided in the growth of humankind since its advent. Due to this
advance, a new computation and communication surrounded such as the Internet of Things …

A novel zerotrust framework to secure iot communications

S Bhattacharjya - 2020 - search.proquest.com
The phenomenal growth of the Internet of Things (IoT) has highlighted the security and
privacy concerns associated with these devices. The research literature on the security …

[PDF][PDF] 阁EasyChair Preprint

M Mohite, S Sakhare, P Dhole - 2024 - easychair.org
This project introduces an intelligent vending machine system that uses advanced
technologies to improve user experience, streamline operations, and support sustainability …

Cyber-physical ubiquitous cycling with fuzzy-controlled panorama manifestation based on Internet of Things technologies

LW Chen, CC Tsao, HM Chen, MF Tsai - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
In this paper, we propose a cyber-physical ubiquitous cycling (CPUC) framework for cyclists
using smartphones to ride a bicycle around the world through street view and virtual reality …