[PDF][PDF] Assessment of existing cyber-attack detection models for web-based systems

OG Awuor - Global Journal of Engineering and Technology …, 2023 - gjeta.com
In the current technological environment, different entities engage in intricate cyber security
approaches in order to counter damages and disruptions in web-based systems. The design …

[PDF][PDF] Federated learning and differential privacy in clinical health: Extensive survey

D Odera - World Journal of Advanced Engineering Technology …, 2023 - wjaets.com
Federated Learning (FL) is concept that has been adopted in medical field to analyze data in
individual devices through aggregation of machine learning model in global server. It also …

[PDF][PDF] A survey on security challenges in the current MANET routing protocols

FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …

A Lossless Quantization Approach for Physical-Layer Key Generation in Vehicular Ad Hoc Networks Based on Received Signal Strength

I Abdelazeem, W Zhang, A Mohamedsalih… - Vehicular …, 2024 - Elsevier
Abstract Vehicular Ad Hoc Networks (VANETs) provide various benefits and play a crucial
role in improving efficiency and ensuring human safety across different applications …

[PDF][PDF] An extensive survey of smart agriculture technologies: Current security posture

M Otieno - World J. Adv. Res. Rev, 2023 - researchgate.net
Smart agriculture, enabled by advanced technologies such as internet of things, artificial
intelligence and data analytics, offers immense potential for optimizing farming practices and …

[HTML][HTML] Data traffic reduction for D2D communications in 5G networks using a multilink approach

W Zhao, M Wang, RO Yahya - Journal of King Saud University-Computer …, 2023 - Elsevier
With the increase in the number of devices connected to the network and the increase in
data rates, data traffic has also increased dramatically. This increase in traffic can lead to the …

[PDF][PDF] A taxonomical survey of 5G and 6G security and privacy issues

JE Ounza - Glob. J. Eng. Technol. Adv, 2023 - gjeta.com
Extensive research has been done on 5G and 6G security challenges. It has been shown
that these challenges have the potential of affecting cross board 5G and 6G ecosystems …

Security challenges in cloud computing: A comprehensive analysis

JJ Ang'udi - World Journal of Advanced Engineering Technology …, 2023 - wjaets.com
The security issues surrounding cloud computing, a quickly developing technology that is
now essential to both personal and business computing, are thoroughly examined in this …

Safeguarding the future: A comprehensive analysis of security measures for smart grids

SA Wasumwa - World Journal of Advanced Research and Reviews, 2023 - wjarr.com
With the rapid advancement of technology and the growing reliance on renewable energy
sources, smart grids have emerged as a transformative solution for enhancing the efficiency …

[PDF][PDF] Security challenges in civil registration: Safeguarding vital information in an evolving landscape.

PK Okoth - World Journal of Advanced Research and Reviews, 2023 - wjarr.com
Civil registration is a fundamental process that captures vital events such as births, deaths,
marriages, and divorces, enabling governments to create accurate demographic databases …