Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security

S Krishnasamy, MB Alotaibi, LI Alehaideb, Q Abbas - Sensors, 2023 - mdpi.com
In the current digital era, Wireless Sensor Networks (WSNs) and the Internet of Things (IoT)
are evolving, transforming human experiences by creating an interconnected environment …

AI-enhanced security demand and routing management for MANETs with optical technologies

X Jia, D Huang, N Qin - Optical and Quantum Electronics, 2024 - Springer
Abstract The proliferation of Mobile Ad hoc Networks (MANETs), where nodes connect with
one another to offer the required real-time entertainment services, is where academics are …

Towards Efficient Federated Learning Using Agile Aggregation in Internet of Vehicles

X He, X Hu, G Wang, J Yu, Z Zhao… - Security and …, 2023 - Wiley Online Library
Federated learning is an enabling technology for the services in Internet of vehicles because
it can effectively alleviate privacy issues in data circulation and diversified intelligent …

Selection of Secure Cluster Head with Trust Management Based Routing Protocol for WSN

S Prajapati, M Desai - 2023 IEEE 4th Annual Flagship India …, 2023 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are networks composed of small, low-power and low-
cost sensor nodes which are densely deployed to monitor the physical environment …

Multiple Disease Prediction System Using Machine Learning

MA Khadir, A Mohd, M Ali, PA Khan - Mathematical Statistician and …, 2023 - philstat.org
The field of healthcare is facing increasing challenges due to the rise in the number of
diseases and the growing population. Medical practitioners are finding it difficult to diagnose …

Windows based ai-voice assistant system using gtts

M Fahad, A Akbar, S Fathima, MA Bari - Mathematical Statistician and …, 2023 - philstat.org
Artificial intelligence has had a significant impact on how people live their lives in a novel
and unusual way and One of these advances is the Voice Based Assistant. Similarly, like a …

[PDF][PDF] Wireless Sensor Node Authentication and Data Security Framework Using Machine Learning

K Nirmala, DVS Rao - Indian Journal …, 2023 - sciresol.s3.us-east-2.amazonaws …
Abstract Objectives: To implement Wireless Sensor Node Authentication and Data Security
Framework Using Machine Learning. Methods: The study is centered on a Generative …

Maximization of Data Transfer Rate by Implementing Opportunistic Routing Protocol for Underwater WSN

S Sharma, M Desai - 2023 IEEE 4th Annual Flagship India …, 2023 - ieeexplore.ieee.org
Underwater Wireless Sensor Networks (UWSNs) have the potential to revolutionize ocean
exploration and monitoring, enabling cost-effective deployment of oceanographic and …

Detection and Elimination of Threats and Attack in Routing Scheme by Diffusion Method in WSN

S Arya, C Asbe - 2023 IEEE 4th Annual Flagship India Council …, 2023 - ieeexplore.ieee.org
Routing schemes are critical for secure data communication across a network. With the
increase in attack vectors, attackers are continuously looking for new attack mechanisms to …

The modern Antivirus security classification model to enhance the protection for commercial computer networks

K Kalsi, V Sharma - 2022 International Interdisciplinary …, 2022 - ieeexplore.ieee.org
Now personal computers are used in which the user has free access to all the resources of
the machine. This opened the door to the danger known as computer virus. The purpose of …