Efficient prioritization and processor selection schemes for heft algorithm: A makespan optimizer for task scheduling in cloud environment

S Gupta, S Iyer, G Agarwal, P Manoharan, AD Algarni… - Electronics, 2022 - mdpi.com
Cloud computing is one of the most commonly used infrastructures for carrying out activities
using virtual machines known as processing units. One of the most fundamental issues with …

SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising

P Manoharan, R Walia, C Iwendi, TA Ahanger… - Expert …, 2023 - Wiley Online Library
Abstract Machine learning are vulnerable to the threats. The Intruders can utilize the
malicious nature of the nodes to attack the training dataset to worsen the process and …

[HTML][HTML] Autonomous transaction model for e-commerce management using blockchain technology

S Sekar, A Solayappan, J Srimathi, S Raja… - International Journal of …, 2022 - igi-global.com
A blockchain is an advanced technology that can power over a decentralized network. The
authors bring it up to design the autonomous transaction system for e-commerce …

[HTML][HTML] Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan… - Journal of …, 2023 - journalofcloudcomputing …
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

Optimized LightGBM model for security and privacy issues in cyber‐physical systems

S Dalal, M Poongodi, UK Lilhore… - Transactions on …, 2023 - Wiley Online Library
Integrating physical, computational, and networking resources are the goal of cyber‐
physical systems, also known as smart‐embedded systems. By investing in a solid …

Computation offloading and heterogeneous task caching in MEC-enabled vehicular networks

R Wu, B Li - The Journal of Supercomputing, 2023 - Springer
Given the rapid growth of business types and the characteristics of delay-sensitive tasks in
vehicular networks, vehicles' computing power is insufficient to handle the demands of a …

Privacy‐preserving authentication scheme for digital twin‐enabled autonomous vehicle environments

CM Chen, Q Miao, S Kumar… - Transactions on Emerging …, 2023 - Wiley Online Library
Currently, the automotive industry has entered a period of considerable advancement,
shifting towards the development of safe, comfortable, and connected autonomous vehicles …

[PDF][PDF] Deep learning based Supply Chain and Waste management using Internet of Things

DAA SaurabhDahiya, N RamKumar… - …, 2022 - researchgate.net
Internet of Things: Waste management has become a big problem because of the rise of the
Internet of Things (IoT). Every day, cities have to deal with waste. It takes a lot of time and …

[HTML][HTML] IOT-BASED cyber security identification model through machine learning technique

B Lal, S Ravichandran, R Kavin, NA Kumar… - Measurement …, 2023 - Elsevier
Manual vulnerability evaluation tools produce erroneous data and lead to difficult analytical
thinking. Such security concerns are exacerbated by the variety, imperfection, and …

Investigation of Trust Models to Alleviate the Authentication Challenge in FinTech

NN Abbas, R Ahmad, S Qazi… - Handbook of Research on …, 2023 - igi-global.com
FinTech applications are increasingly vulnerable to cyber-attacks (identity theft, data
breaches, distributed denial of service attacks, phishing attacks, insider threats), which have …