Cyber-security and reinforcement learning—a brief survey

AMK Adawadkar, N Kulkarni - Engineering Applications of Artificial …, 2022 - Elsevier
This paper presents a comprehensive literature review on Reinforcement Learning (RL)
techniques used in Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) …

A novel framework on security and energy enhancement based on internet of medical things for healthcare 5.0

R Natarajan, GH Lokesh, F Flammini, A Premkumar… - Infrastructures, 2023 - mdpi.com
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method
of connecting medical equipment and the software that operates on it to the computer …

Diagnosis of Brain Tumor Using Light Weight Deep Learning Model with Fine‐Tuning Approach

T Shelatkar, Urvashi, M Shorfuzzaman… - … Methods in Medicine, 2022 - Wiley Online Library
Brain cancer is a rare and deadly disease with a slim chance of survival. One of the most
important tasks for neurologists and radiologists is to detect brain tumors early. Recent …

Information security applications in smart cities: A bibliometric analysis of emerging research

T Poleto, TCC Nepomuceno, VDH De Carvalho… - Future Internet, 2023 - mdpi.com
This paper aims to analyze the intellectual structure and research fronts in application
information security in smart cities to identify research boundaries, trends, and new …

TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor

N Singh, AK Das - The Journal of Supercomputing, 2024 - Springer
Security vulnerabilities associated with Internet of Medical Things (IoMT) may lead to health
disasters. The researchers already have designed several lightweight authentication …

[HTML][HTML] A user-centric privacy-preserving authentication protocol for IoT-AmI environments

M Masud, GS Gaba, P Kumar, A Gurtov - Computer Communications, 2022 - Elsevier
Abstract Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare
professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has …

BP-AKAA: blockchain-enforced privacy-preserving authentication and key agreement and access control for IIoT

S Liu, L Chen, H Yu, S Gao, H Fang - Journal of Information Security and …, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) links multiple subnets to accomplish more
real-time, efficient, and high-class production. Authentication is an essential prerequisite for …

IOT‐Based Medical Informatics Farming System with Predictive Data Analytics Using Supervised Machine Learning Algorithms

A Rokade, M Singh, SK Arora… - … Methods in Medicine, 2022 - Wiley Online Library
In the farming industry, the Internet of Things (IoT) is crucial for boosting utility. Innovative
agriculture practices and medical informatics have the potential to increase crop yield while …

Highly Efficient Bidirectional Multifactor Authentication and Key Agreement for Real-Time Access to Sensor Data

A Braeken - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
This article presents an authentication and key agreement protocol for users who want to
have access to constrained sensor nodes deployed in the field, eg, doctor with healthcare …

[HTML][HTML] AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

S Khan, GS Gaba, A Braeken, P Kumar… - International Journal of …, 2023 - Elsevier
Abstract Controller-Pilot Data Link Communications (CPDLC) are rapidly replacing voice-
based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly …