IoT malware: An attribute-based taxonomy, detection mechanisms and challenges

P Victor, AH Lashkari, R Lu, T Sasi, P Xiong… - Peer-to-peer Networking …, 2023 - Springer
During the past decade, the Internet of Things (IoT) has paved the way for the ongoing
digitization of society in unique ways. Its penetration into enterprise and day-to-day lives …

Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective

AK Mishra, S Paliwal - Cluster Computing, 2023 - Springer
The network traffic has observed astounding expansion and is set to explode in the next few
years. Security attacks are becoming more and more synchronized as attackers are involved …

[HTML][HTML] Medi-Block record: Secure data sharing using block chain technology

C Singh, D Chauhan, SA Deshmukh, SS Vishnu… - Informatics in Medicine …, 2021 - Elsevier
With the advances in the era of Artificial intelligence, block chain, cloud computing, big data
has the need for secure, decentralized medical record storage and retrieval systems, while …

Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)

S Abidin, A Swami, E Ramirez-Asís… - Materials Today …, 2022 - Elsevier
Quantum cryptography concentrates on the solution of cryptography that is imperishable due
to the reason of fortification of secrecy which is applied to the public key distribution of …

SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks

I Syamsuddin, OM Barukab - electronics, 2022 - mdpi.com
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …

Iot and data mining techniques to detect and regulating of solar power system

KSR Kumar, RR Solanke, G Laxmaiah… - 2023 International …, 2023 - ieeexplore.ieee.org
As a result of its practical and long-term benefits, renewable energy sources are the subject
of intensive study. For instance, solar power stations are among the renewable energy …

A comprehensive analysis of the effectiveness of machine learning algorithms for predicting water quality

P Rawat, M Bajaj, V Sharma… - … Conference on Innovative …, 2023 - ieeexplore.ieee.org
This study provides a comprehensive analysis of the effectiveness of eight different machine
learning algorithms for predicting water quality. The algorithms, which include Gaussian …

RETRACTED ARTICLE: Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI …

N Prakash, J Vignesh, M Ashwin, S Ramadass… - Optical and Quantum …, 2024 - Springer
The swift advancement of next-generation technologies for wireless communication has led
to the cloud computing model becoming a more effective technique of data processing. In …

TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment

H Nandanwar, R Katarya - International Journal of Information Security, 2024 - Springer
The ubiquity of the Internet-of-Things (IoT) systems across various industries, smart cities,
health care, manufacturing, and government services has led to an increased risk of security …

Controller cyber-attack detection and isolation

A Sztyber-Betley, M Syfert, JM Kościelny, Z Górecka - Sensors, 2023 - mdpi.com
This article deals with the cyber security of industrial control systems. Methods for detecting
and isolating process faults and cyber-attacks, consisting of elementary actions named …