[PDF][PDF] Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks

N Ravichandran, T Tewaraja, V Rajasegaran… - Preprints. org, 2024 - preprints.org
With all the sophisticated threats to network security, intrusion detection is a section of the
security technology industry that is becoming increasingly significant. In this research paper …

[HTML][HTML] A Novel Approach of a Low-Cost Voltage Fault Injection Method for Resource-Constrained IoT Devices: Design and Analysis

N Ruminot, C Estevez, S Montejo-Sánchez - Sensors, 2023 - mdpi.com
The rapid development of the Internet of Things (IoT) has brought about the processing and
storage of sensitive information on resource-constrained devices, which are susceptible to …

Message security level integration with iotes: A design dependent encryption selection model for iot devices

M Saleh, NZ Jhanjhi, A Abdullah… - International Journal of …, 2022 - koreascience.kr
Abstract The Internet of Things (IoT) is a technology that offers lucrative services in various
industries to facilitate human communities. Important information on people and their …

Crop Yield Prediction in Agriculture Using Gradient Boosting Algorithm Compared with Random Forest

MYSK Yasaswy, T Manimegalai… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
To predict the crop yield rate using Innovative Gradient Boosting over Random Forest in
Agriculture. Random Forest and Gradient Boosting with sample size (N= 20) were iter-ated …

IoT-Enabled Smart Warehousing with AMR Robots and Blockchain: A Comprehensive Approach to Efficiency and Safety

S Balakrishnan, AD Azman, J Nisar… - International Conference …, 2023 - Springer
The demand for efficient and secure warehouse operations has significantly increased due
to growing customer expectations and competition in modern businesses. Smart …

Sustainable Computing-Based Simulation of Intelligent Border Surveillance Using Mobile WSN

RMA Latif, M Farhan, NA Khan… - Navigating Cyber Threats …, 2024 - igi-global.com
This chapter has simulated and designed the intrusion detection and border surveillance
system using mobile WSN technology. Due to increased terrorism globally, border protection …

[PDF][PDF] In-Depth Analysis and Countermeasures for Ransomware Attacks: Case Studies and Recommendations

YJ Seng, TY Cen, MAH bin Mohd Raslan… - 2024 - preprints.org
Ransomware, a combination of" ransom" and" malware," is a type of malicious software
designed to encrypt or block access to a victim's data or system, demanding a ransom for its …

Vehicular Grounding Situation For Intelligent Transportation Administration Using AODV to Decrease the Round Trip in Urban and Semi Urban Using Smart Transport …

MYSK Yasaswy, A Sivagami… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
To reduce round trip times of vehicular grounding for intelligent transport administration
using Ad Hoc On Demand Vector (AODV) in urban and semi-urban areas using smart …

Girl Child Security System based on IOT Technology with GPS Tracker Comparing with Fuzzy Classifier Based Safety Device

J Swaroop, TJ Nagalakshmi… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
In this work girl child security system using a GPS tracker in lOT with Thingspeak (Group 1)
is going to be designed and compared with the girl child security device using fuzzy …

I-Paver QR-based OPC UA architecture for IoT retail security

KR DR, H Kumar, K Ayyappaswamy, C Ravindramurthy… - 2024 - researchsquare.com
QR code access is required for payment transactions, these details should be protected with
enhanced security. Implementation of IoT devices in retail needs to have good …