Batch reinforcement learning approach using recursive feature elimination for network intrusion detection

A Sharma, M Singh - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
In the era of escalating cyber threats and increased Internet dependence, enhancing
intrusion detection systems is essential. Concerns are emerging regarding the viability and …

[PDF][PDF] Dingo algorithm-based forwarder selection and huffman coding to improve authentication

NU Bhanu, PB Priya, T Sajana, S Shanthi… - Indonesian Journal of …, 2023 - academia.edu
In wireless sensor network (WSN), the high volume of observe and transmitted data among
sensor nodes make it requires to maintain the security. Even though numerous secure data …

A new lossless electroencephalogram compression technique for fog computing‐based IoHT networks

A Kadhum Idrees… - International Journal of …, 2023 - Wiley Online Library
The ability to design smarter, more predictive healthcare solutions for use in the community
(at work and at home) and in healthcare facilities has been greatly enhanced by recent …

Gfrx: A new lightweight block cipher for resource-constrained iot nodes

X Zhang, S Tang, T Li, X Li, C Wang - Electronics, 2023 - mdpi.com
The study of lightweight block ciphers has been a “hot topic”. As one of the main structures of
block ciphers, the Feistel structure has attracted much attention. However, the traditional …

Ethical Knowledge Sharing Leveraging Blockchain: An Overview

PADSN Wijesekara - Science, Engineering and Technology, 2024 - setjournal.com
The knowledge that is acquired through a learning process has ethical concerns when
shared, as there can be restrictions on the parties who can use the piece of knowledge …

A survey on security threats and network vulnerabilities in Internet of Things

HK Saini, M Poriye, N Goyal - Big Data Analytics in Intelligent IoT and …, 2023 - Springer
Abstract Internet of Things (IoT) is a group of physical objects like sensors and actuators etc.
connected through the network for dynamic exchange of information for augmenting the …

AI-Driven IoT Healthcare System for Real-Time ECG Analysis and Comprehensive Patient Monitoring

M SEDDIKI, M BOUHEDDA, A TOBBAL… - Science, Engineering …, 2024 - setjournal.com
This study explores the integration of deep learning and Internet of Things (IoT) technologies
to enhance healthcare delivery, with a primary focus on improving electrocardiogram (ECG) …

[HTML][HTML] Evaluating the prognostic impact of hypoperfusion intensity ratio in acute ischemic stroke patients undergoing early-phase endovascular thrombectomy

A Sun, Y Cao, Z Jia, L Zhao, H Shi, S Liu - Medicine, 2024 - journals.lww.com
This research aimed to assess the prognostic relevance of the hypoperfusion intensity ratio
(HIR) concerning 90-day outcomes in patients with acute ischemic stroke (AIS) managed …

[PDF][PDF] A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks.

B Liu, Z Zhang, S Hu, S Sun, D Liu… - Computers, Materials & …, 2024 - cdn.techscience.cn
ABSTRACT Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to
resource limitations, many anomaly detection systems (ADSs) for IoT have high false …

Improved database security using cryptography with genetic operators

SR Devara, C Azad - SN Computer Science, 2023 - Springer
Database security is of utmost importance in today's digital age where sensitive data is
vulnerable to unauthorized access and cyber-attacks. Various security models have been …