AK Mishra, S Paliwal - Cluster Computing, 2023 - Springer
The network traffic has observed astounding expansion and is set to explode in the next few years. Security attacks are becoming more and more synchronized as attackers are involved …
With the advances in the era of Artificial intelligence, block chain, cloud computing, big data has the need for secure, decentralized medical record storage and retrieval systems, while …
Quantum cryptography concentrates on the solution of cryptography that is imperishable due to the reason of fortification of secrecy which is applied to the public key distribution of …
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
KSR Kumar, RR Solanke, G Laxmaiah… - 2023 International …, 2023 - ieeexplore.ieee.org
As a result of its practical and long-term benefits, renewable energy sources are the subject of intensive study. For instance, solar power stations are among the renewable energy …
P Rawat, M Bajaj, V Sharma… - … Conference on Innovative …, 2023 - ieeexplore.ieee.org
This study provides a comprehensive analysis of the effectiveness of eight different machine learning algorithms for predicting water quality. The algorithms, which include Gaussian …
The swift advancement of next-generation technologies for wireless communication has led to the cloud computing model becoming a more effective technique of data processing. In …
H Nandanwar, R Katarya - International Journal of Information Security, 2024 - Springer
The ubiquity of the Internet-of-Things (IoT) systems across various industries, smart cities, health care, manufacturing, and government services has led to an increased risk of security …
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named …