BigRC-EML: big-data based ransomware classification using ensemble machine learning

S Aurangzeb, H Anwar, MA Naeem, M Aleem - Cluster Computing, 2022 - Springer
Ransomware is a subcategory of malware whose specific goal is to hold the victim's data by
using encryption techniques until a ransom is paid. With mainstream usage of the Windows …

WOA+ BRNN: An imbalanced big data classification framework using Whale optimization and deep neural network

EM Hassib, AI El-Desouky, LM Labib, ESM El-Kenawy - soft computing, 2020 - Springer
Nowadays, big data plays a substantial part in information knowledge analysis,
manipulation, and forecasting. Analyzing and extracting knowledge from such big datasets …

Harness the global impact of big data in nurturing social entrepreneurship: A systematic literature review

NA Zulkefly, NA Ghani, S Hamid, M Ahmad… - Journal of Global …, 2021 - igi-global.com
The global impact of social values, norms, and cultures set the growth and future dimensions
of most businesses. In global business governess, the sustainability of social …

Anomaly detection and trust authority in artificial intelligence and cloud computing

KN Qureshi, G Jeon, F Piccialli - Computer Networks, 2021 - Elsevier
The rapid development of smart Internet of Things (IoT) and its multimedia applications with
conventional cloud and edge computing platforms are driving a new trend that shifts the …

Smart decision-making and communication strategy in industrial Internet of Things

K Gunasekaran, VV Kumar, AC Kaladevi… - IEEE …, 2023 - ieeexplore.ieee.org
Smart machine-machine (M2M) interactions, such as those enabled by the Internet of Things
(IoT), have enabled people and machines to communicate and make decisions together …

IoT & environmental analytical chemistry: Towards a profitable symbiosis

JV Capella, A Bonastre, JC Campelo, R Ors… - Trends in Environmental …, 2020 - Elsevier
In a constantly evolving world, where the rising population and increased social awareness
have led to a higher concern for the environment, research in this field (most notably in …

Trust management and evaluation for edge intelligence in the Internet of Things

KN Qureshi, A Iftikhar, SN Bhatti, F Piccialli… - … Applications of Artificial …, 2020 - Elsevier
Abstract Information and Communication Technologies (ICTs) have revolutionised the
traditional communication processes, converting the cities into Smart Cities. Internet of …

IoT-guard: Event-driven fog-based video surveillance system for real-time security management

T Sultana, KA Wahid - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we design and implement a distributed Internet of Things (IoT) framework
called IoT-guard, for an intelligent, resource-efficient, and real-time security management …

A new container scheduling algorithm based on multi-objective optimization

B Liu, P Li, W Lin, N Shu, Y Li, V Chang - Soft Computing, 2018 - Springer
Docker container has been used in cloud computing at a rapid rate in the past 2 years, and
Docker container resource scheduling problem has gradually become a research hot issue …

Trust aware energy management system for smart homes appliances

KN Qureshi, A Alhudhaif, A Hussain, S Iqbal… - Computers & Electrical …, 2022 - Elsevier
Smart grids have gained popularity to manage energy resources on the consumption side.
Energy management on the home side is still under consideration where the system controls …