[Retracted] Next Generation IoT and Blockchain Integration

S Tanwar, N Gupta, C Iwendi, K Kumar… - Journal of …, 2022 - Wiley Online Library
The Internet of Things (IoT) refers to the interconnection of smart devices to collect data and
make intelligent decisions. However, a lack of intrinsic security measures makes next …

Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model

B Bojarajulu, S Tanwar, TP Singh - Computers & Security, 2023 - Elsevier
The botnet have developed into a severe risk to Internet of Things (IoT) systems as a result
of manufacturers 'insufficient security policies and end users' lack of security awareness. By …

The use of AI to analyze social media attacks for predictive analytics

TS Adekunle, OO Alabi, MO Lawrence… - Journal of …, 2024 - publikasi2.dinus.ac.id
Social engineering (SE) presents weaknesses that are difficult to quantify in penetration
testing directly. The majority of expert social engineers utilize phishing and adware tactics to …

Comparison between code clone detection and model clone detection

G Shobha, A Rana, V Kansal… - 2021 9th International …, 2021 - ieeexplore.ieee.org
In software, clones are syntactically or semantically identical of two code fragments. Cloning
by either deliberately or by coincidence. Cloning has pros and cons in software …

Consensus Algorithms in Blockchain for an Efficient and Secure Network

M Gupta, S Tanwar, N Lal, R Pawar - Recent Trends and Best …, 2023 - taylorfrancis.com
Cryptocurrencies created a trendsetter after the emergence of Bitcoin in the last decade.
Blockchain technology is the backbone behind cryptocurrencies and gave rise to its usage …

Vulnerability Analysis of Critical Resources Using Machine Learning

S Karthika - International Conference on Computer & …, 2023 - Springer
Lack of cyber awareness among working professionals, especially in the IT field, has
resulted in negative actors taking advantage of poorly built/configured critical resources …

Bibliometric Mapping of Theme and Trends of Blockchain

G Kaur - 2024 11th International Conference on Reliability …, 2024 - ieeexplore.ieee.org
By examining three research topics, this review paper examines the state of blockchain
technology research. To grasp the most recent improvements and innovations, it is first …

Reveal: Online fake job advert detection application using machine learning

C Prashanth, D Chandrasekaran… - 2022 IEEE Delhi …, 2022 - ieeexplore.ieee.org
New technologies are rapidly emerging to fight increasing Job scams. Online Job scams are
onerous to detect, thus giving the perpetrators plenty of time to flee the area in which the …

[PDF][PDF] STRATEGI CYBERSECURITY PEMERINTAH INDIA DARI PERSPEKTIF KAUTILYA

RA Rossdiana, TR Fahrisa - Indonesian Journal of International …, 2023 - academia.edu
This paper aims to elaborate on the Indian Government's cybersecurity strategy from
Kautilya's perspective by taking the example of the Mumbai cyberattack case in 2020. By …

Fake Review Identification Using Machine Learning

C Singh, S Tanwar - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The use of false opinions, sometimes known as fake reviews, to mislead customers has
become more common in recent times. This is due to the fast growth of online marketing …