[HTML][HTML] Agrisecure: A fog computing-based security framework for agriculture 4.0 via blockchain

S Padhy, M Alowaidi, S Dash, M Alshehri, PP Malla… - Processes, 2023 - mdpi.com
Every aspect of the 21st century has undergone a revolution because of the Internet of
Things (IoT) and smart computing technologies. These technologies are applied in many …

[HTML][HTML] Digital Health Dashboards for Decision-Making to Enable Rapid Responses During Public Health Crises: Replicable and Scalable Methodology

TR Katapally, ST Ibrahim - JMIR Research Protocols, 2023 - researchprotocols.org
Background: The COVID-19 pandemic has reiterated the need for cohesive, collective, and
deliberate societal efforts to address inherent inefficiencies in our health systems and …

A Systematic Literature Review of Genetic Algorithm-Based Approaches for Cloud Task Scheduling

HT Ciptaningtyas, AM Shiddiqi… - 2023 14th International …, 2023 - ieeexplore.ieee.org
Cloud computing offers a promising approach to efficiently distribute tasks and workflows
among virtual resources. Optimal scheduling of these resources is crucial to maximize the …

Malicious Traffic Classification in WSN using Deep Learning Approaches

CLP Gupta, D Rajassekharan… - … Security and Artificial …, 2023 - ieeexplore.ieee.org
Classifying malicious traffic in Wireless Sensor Networks (WSNs) is crucial for maintaining
the network's security and dependability. Traditional security techniques are challenging to …

Design of Mutual Authentication Method for Deep Learning Based Hybrid Cryptography to Secure data in Cloud Computing.

AA Mohd, S Kummarikunta… - … Journal of Safety & …, 2023 - search.ebscohost.com
In today's highly competitive environment, it might be difficult to keep sensitive data or
information safe. Sharing sensitive information between parties in a cloud environment …

Investigation of COVID-19 symptoms using deep learning based image enhancement scheme for x-ray medical images

V Pandimurugan, AV Prabu… - International …, 2023 - inderscienceonline.com
Image enhancement is the inevitable technique for investigating various biological features.
The biological image data can be obtained from computer tomography (CT), magnetic …

Comparative Analysis of Feature Selection Methods for Detection of Android Malware

M Dhalaria, E Gandotra, D Gupta - … of Deep Learning and Internet of …, 2023 - igi-global.com
Over the past few years, Android has been found to be the most prevalent operating system.
The increase in the adoption of Android by users has led to many security issues. The …

A SYSTEMATIC LITERATURE REVIEW ON SECURITY ISSUES IN CLOUD COMPUTING USING EDGE COMPUTING AND BLOCKCHAIN: THREAT, MITIGATION …

MA Khan, SM Khan… - Malaysian Journal of …, 2023 - mojes.um.edu.my
Abstract This Systematic Literature Review (SLR) examines the security threats experienced
by cloud computing along with QoS by edge computing and scheduling. Various consumers …

SECURITY ISSUES IN CLOUD COMPUTING USING EDGE COMPUTING AND BLOCKCHAIN: THREAT, MITIGATION, AND FUTURE TRENDS-A SYSTEMATIC …

MA Khan, SM Khan… - Malaysian Journal of …, 2023 - search.ebscohost.com
Within the neoteric decade, cloud computing has grown as emerging technology which is an
on-demand availability of network resources, particularly data storage without any …

Defensive Countermeasures Towards Addressing Cloud Security Attacks

D Saxena, S Rekha - Authorea Preprints, 2023 - techrxiv.org
The multi-tenant resource-sharing environment of cloud computing among multiple users
and vulnerabilities of virtual machines (VM) s and physical machines prompt unauthorized …