[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

Deep federated learning enhanced secure POI microservices for cyber-physical systems

Z Guo, K Yu, Z Lv, KKR Choo, P Shi… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
An essential consideration in cyber-physical systems (CPS) is the ability to support secure
communication services, such as points of interest (POI) microservices. Existing approaches …

Privacy preservation models for third-party auditor over cloud computing: A survey

A Razaque, MBH Frej, B Alotaibi, M Alotaibi - Electronics, 2021 - mdpi.com
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …

Agrisecure: A fog computing-based security framework for agriculture 4.0 via blockchain

S Padhy, M Alowaidi, S Dash, M Alshehri, PP Malla… - Processes, 2023 - mdpi.com
Every aspect of the 21st century has undergone a revolution because of the Internet of
Things (IoT) and smart computing technologies. These technologies are applied in many …

Reinforcement learning assisted bandwidth aware virtual network resource allocation

P Zhang, Y Su, J Wang, C Jiang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Space-air-ground integration to support seamless coverage of ground, satellite, airborne,
and marine communications, is likely to be a key trend in the 6G era. One of several key …

Modern Energy Optimization Approach for Efficient Data Communication in IoT‐Based Wireless Sensor Networks

L Sathish Kumar, S Ahmad, S Routray… - Wireless …, 2022 - Wiley Online Library
Many researchers are drawn to mobile wireless sensor networks (WSN) and the Internet of
Things (IoT) because of the significant challenges of power consumption and network …

[HTML][HTML] Digital Health Dashboards for Decision-Making to Enable Rapid Responses During Public Health Crises: Replicable and Scalable Methodology

TR Katapally, ST Ibrahim - JMIR Research Protocols, 2023 - researchprotocols.org
Background: The COVID-19 pandemic has reiterated the need for cohesive, collective, and
deliberate societal efforts to address inherent inefficiencies in our health systems and …

A deep learning assisted software defined security architecture for 6G wireless networks: IIoT perspective

MA Rahman, MS Hossain - IEEE Wireless Communications, 2022 - ieeexplore.ieee.org
The 6G wireless network is expected to drive cyber-physical systems (CPS) from merely
connected things to securely connected intelligence. While 6G will offer real-time …

Cooperative and feedback based authentic routing protocol for energy efficient IoT systems

A Gayathri, AV Prabu, S Rajasoundaran… - Concurrency and …, 2022 - Wiley Online Library
The open communication medium of the Internet of Things (IoT) is more vulnerable to
security attacks. As the IoT environment consists of distributed power limited units, the …

Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks

S Rajasoundaran, SVNS Kumar, M Selvi… - Wireless …, 2024 - Springer
Abstract Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit
the data through water medium and monitor the oceanic conditions, water contents, under …