Medical Defense Nanorobots (MDNRs): a new evaluation and selection of controller criteria for improved disease diagnosis and patient safety using NARMA (L2) …

HM Marhoon, N Basil, AF Mohammed - International Journal of Information …, 2024 - Springer
This article addresses the complexity of optimizing movements in Medical Defense
Nanorobots (MDNRs) by proposing a novel integration approach. The challenge lies in …

An energy efficient encryption technique for the Internet of Things sensor nodes

I Sultan, MT Banday - International Journal of Information Technology, 2024 - Springer
Securing data at the back end in Internet of Things (IoT) applications, such as a cloud server,
is easy due to the ample computational resources at that stage. However, securing the data …

Navigating Zero-Knowledge Authentication in the IoT Landscape: A Comprehensive Survey

AR Faridi, Z Anjum - 2024 11th International Conference on …, 2024 - ieeexplore.ieee.org
With the growing demand for Internet of Things devices and their usage in day-to-day life,
security is the prime factor that needs to be considered. In Internet of Things devices …

DeepNews: enhancing fake news detection using generative round network (GRN)

P Wanda, M Diqi - International Journal of Information Technology, 2024 - Springer
Fake news is a crucial issue in social media that spreads intentionally crafted false content
designed to mislead the public over the digital platform. Many communities have proposed …

Analyze quantum security in software design using fuzzy-AHP

M Nadeem - International Journal of Information Technology, 2024 - Springer
Quantum Security is a conceptual phenomenon of security that uses the quantum
mechanical concept in computing. Superposition and entanglement are the quantum …

Fusing nature inspired fuzzy neural networks for hypervisor intrusion detection

A Ashwitha, MS Banu, P Kaur - International Journal of Information …, 2024 - Springer
In the realm of cloud computing, hypervisors play a pivotal role as virtualization layers,
managing and orchestrating virtual machines on physical host systems. The data generated …

Secure aware disaster recovery in cloud using an adaptive coati optimization algorithm

S Vinothkumar, J Amutharaj - International Journal of Information …, 2024 - Springer
As cloud computing has developed and gained in popularity, people and businesses have
quickly adapted to using cloud services for a variety of purposes. The fundamental driver of …

Hybrid cryptosystem based healthcare data sharing with access control policy in cloud environment

S Vinothkumar, J Amutharaj - International Journal of Information …, 2024 - Springer
Healthcare cloud computing environments are expanding quickly, and security and
confidentiality of patient records are top priorities. Academics and researchers are becoming …

Multi-objective load balancing based on adaptive osprey optimization algorithm

K Panneerselvam, PP Nayudu, MS Banu… - International Journal of …, 2024 - Springer
With the increasing complexity of distributed systems, achieving an optimal distribution of
tasks across resources is paramount for enhancing system performance. Therefore, in this …

Prevention of Security Attacks at Wireless Network Layers using Machine Learning Techniques

S Ramisetty, GSP Ghantasala… - 2024 11th International …, 2024 - ieeexplore.ieee.org
Wireless sensor networks have great potential for use in flood control, weather forecasting
systems, the military, and the healthcare industry. A WSN's nodes are connected to one …