A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology

G Rathee, A Sharma, H Saini, R Kumar… - Multimedia Tools and …, 2020 - Springer
Through the propagation of technology in recent years, people communicate in a range of
ways via multimedia. The use of multimedia technique in healthcare system also makes it …

Evolution and adoption of next generation IoT-driven health care 4.0 systems

D Arora, S Gupta, A Anpalagan - Wireless Personal Communications, 2022 - Springer
The uprising of Internet of Things (IoT) has dramatically influenced the world's technology in
terms of interoperability, connectivity and interconnectivity with help of smart sensors …

Machine learning in network anomaly detection: A survey

S Wang, JF Balarezo, S Kandeepan… - IEEE …, 2021 - ieeexplore.ieee.org
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …

Chronological salp swarm algorithm based deep belief network for intrusion detection in cloud using fuzzy entropy

L Karuppusamy, J Ravi, M Dabbu… - … Journal of Numerical …, 2022 - Wiley Online Library
Cloud computing is susceptible to the existing information technology attacks, as it extends
and uses the traditional operating system, information technology infrastructure, and …

[HTML][HTML] Enhancing industrial cyber security, focusing on formulating a practical strategy for making predictions through machine learning tools in cloud computing …

Z Abbas, S Myeong - Electronics, 2023 - mdpi.com
Cloud computing has revolutionized how industries store, process, and access data.
However, the increasing adoption of cloud technology has also raised concerns regarding …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …

[HTML][HTML] A machine learning based sentient multimedia framework to increase safety at work

G Bonifazi, E Corradini, D Ursino, L Virgili… - Multimedia tools and …, 2022 - Springer
In the last few decades, we have witnessed an increasing focus on safety in the workplace.
ICT has always played a leading role in this context. One ICT sector that is increasingly …

Study and investigation of cloud based security policies using machine learning techniques

V Joon, A De, N Mishra - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
In recent days, most organizations have started to use cloud environments and various
cloud services. To secure and secure the operations that an organization performs in the …

An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment

N Mageshkumar, L Lakshmanan - The Journal of Supercomputing, 2022 - Springer
Data deduplication is a process that gets rid of excessive duplicates of data and minimizes
the storage capacity to a large extent. This process mainly optimizes redundancies without …

Expert system based detection and classification of coronary artery disease using ranking methods and nonlinear attributes

RS Singh, DJ Gelmecha, DK Sinha - Multimedia Tools and Applications, 2022 - Springer
This article presents an automated algorithm which combines ranking method with
generalized discriminant analysis (GDA) and1-norm extreme learning machine (1-NELM) to …