Comparative Analysis of Weighted Ensemble and Majority Voting Algorithms for Intrusion Detection in OpenStack Cloud Environments.

P Patil, G Kale, N Bivalkar… - International Journal of …, 2023 - search.ebscohost.com
In the ever-evolving landscape of cybersecurity, the detection of malicious activities within
cloud environments remains a critical challenge. This research aims to compare the …

An IoT-based Home Automation System using NodeMCU and Blynk IoT App

T Deenadayalan, JJ Shirley, R Prajapati… - 2023 International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) has revolutionized the way of living by connecting everyday
devices to the Internet. One of the most promising applications of IoT is home automation …

[HTML][HTML] Secured and Sustainable Supply Chain Management Using Key Escrow Encryption Technique in Blockchain Mechanism

A Anitha, M Priya, MK Nallakaruppan… - … on Internet of Things, 2024 - publications.eai.eu
INTRODUCTION: Supply chain management is the management process of the flow of
goods, and services related to financial functionalities, procurement of raw materials delivery …