Pythagorean Fuzzy Sets-based VIKOR and TOPSIS-based multi-criteria decision-making model for mitigating resource deletion attacks in WSNs

S Madhavi, NC Santhosh, S Rajkumar… - Journal of Intelligent …, 2023 - content.iospress.com
Abstract In Wireless Sensor Networks (WSNs), resource depletion attacks that focusses on
the compromization of routing protocol layer is identified to facilitate a major influence over …

Offensive artificial intelligence: current state of the art and future directions

M Malatji - 2023 International conference on digital applications …, 2023 - ieeexplore.ieee.org
In recent years, the use of artificial intelligence (AI) has become increasingly prevalent in
various industries, including cybersecurity. However, the same capabilities that make AI …

An application of meta‐heuristic and nature‐inspired algorithms for designing reliable networks based on the Internet of things: A systematic literature review

J Gong - International Journal of Communication Systems, 2023 - Wiley Online Library
The widespread use of Internet of Things (IoT) in various wireless sensor networks
applications has increased their importance in recent years. IoT is a smart technology that …

Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI

M Malatji, A Tolah - AI and Ethics, 2024 - Springer
Abstract As Artificial Intelligence (AI) rapidly advances and integrates into various domains,
cybersecurity emerges as a critical field grappling with both the benefits and pitfalls of AI …

[PDF][PDF] DYNAMIC RESOURCE ALLOCATION IN EDGE COMPUTING ENVIRONMENTS: A MACHINE LEARNING APPROACH

A Gunjal, R Pednekar, S Kanere, S Ruke - 2024 - jai.aspur.rs
Edge computing is a promising paradigm that addresses the limitations of traditional cloud-
centric architectures by placing computation near the data source. The main challenge is …