Application of Machine Learning approach on Halal meat authentication principle, challenges, and prospects: A Review

A Mustapha, I Ishak, NNM Zaki, MR Ismail-Fitry… - Heliyon, 2024 - cell.com
Meat is a source of essential amino acids that are necessary for human growth and
development, meat can come from dead, alive, Halal, or non-Halal animal species which are …

An optimized machine learning model for the detection of man-in-the-middle attack in mobile edge computing

RL Moila, M Velempini - 2024 IST-Africa Conference (IST …, 2024 - ieeexplore.ieee.org
Edge computing has gained significance in processing data near the source. However, its
distributed and resource-constrained nature is prone to security challenges, particularly the …

Systematic Mapping Study on Edge and Fog Computing in Smart Cities: A Comprehensive Review

R Kumari, K Kaur, G Chhabra… - 2024 International …, 2024 - ieeexplore.ieee.org
Urbanization's rapid pace and the growing need for smart city technology have given rise to
computing at the edge and in the fog paradigms. These paradigms show promise in …

IoT Security: A Comparative Analysis of Intrusion Detection Systems Based on Machine Learning, Deep Learning and Transfer Learning Techniques

H Mahjoubi, K Aissaoui - International Conference on Smart Medical, IoT …, 2024 - Springer
Abstract Internet of Things (IoT) regroups a huge number of smart devices connected and ex-
changed data between them and with other objects and systems via the internet. The …

[引用][C] Developing an Innovative Network Security Attack Detection Model Through Artificial Intelligence and Edge Computing

Y Zhuang - SPIN, 2024 - World Scientific
Securing a network at its edge, that is, the location where a user creates and stores data
within a larger network is defined as edge security. It is essential to have this type of …