Efficient prioritization and processor selection schemes for heft algorithm: A makespan optimizer for task scheduling in cloud environment

S Gupta, S Iyer, G Agarwal, P Manoharan, AD Algarni… - Electronics, 2022 - mdpi.com
Cloud computing is one of the most commonly used infrastructures for carrying out activities
using virtual machines known as processing units. One of the most fundamental issues with …

SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising

P Manoharan, R Walia, C Iwendi, TA Ahanger… - Expert …, 2023 - Wiley Online Library
Abstract Machine learning are vulnerable to the threats. The Intruders can utilize the
malicious nature of the nodes to attack the training dataset to worsen the process and …

Autonomous transaction model for e-commerce management using blockchain technology

S Sekar, A Solayappan, J Srimathi, S Raja… - International Journal of …, 2022 - igi-global.com
A blockchain is an advanced technology that can power over a decentralized network. The
authors bring it up to design the autonomous transaction system for e-commerce …

Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning

UK Lilhore, P Manoharan, S Simaiya, R Alroobaea… - Sensors, 2023 - mdpi.com
Industrial automation systems are undergoing a revolutionary change with the use of
Internet-connected operating equipment and the adoption of cutting-edge advanced …

Optimized LightGBM model for security and privacy issues in cyber‐physical systems

S Dalal, M Poongodi, UK Lilhore… - Transactions on …, 2023 - Wiley Online Library
Integrating physical, computational, and networking resources are the goal of cyber‐
physical systems, also known as smart‐embedded systems. By investing in a solid …

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

S Dalal, UK Lilhore, N Faujdar, S Simaiya… - Journal of Cloud …, 2023 - Springer
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …

Privacy‐preserving authentication scheme for digital twin‐enabled autonomous vehicle environments

CM Chen, Q Miao, S Kumar… - Transactions on Emerging …, 2023 - Wiley Online Library
Currently, the automotive industry has entered a period of considerable advancement,
shifting towards the development of safe, comfortable, and connected autonomous vehicles …