Security threats in IoT: vision, technologies and research challenges

A Raj, S Prakash - … for Computational Intelligence: Proceedings of ICTSCI …, 2022 - Springer
Internet of things is a group of numerous types of objects “things” that are embedded with
sensors, software, and different technologies to communicate and share data with other …

Self-learning chatbots using reinforcement learning

MB Lone, N Nazir, N Kaur, D Pradeep… - 2022 3rd …, 2022 - ieeexplore.ieee.org
There has been a surge in the development of dialogue generation systems also called
chatbots in Recent years. Research on sequence-to-sequence architectural chatbots has …

An analytical study on intrusion detection system in integrated vehicular ad-hoc network attacks

S Kumawat, H Kaur, O Dahiya - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Vehicular networks are getting an important technology in the traffic system. VANET simply
means the vehicles are connected or interlinked wirelessly to interchange information. By …

Network security defence system based on artificial intelligence and big data technology

L Xie, F Hang, W Guo, Y Lv, W Ou… - … journal of high …, 2021 - inderscienceonline.com
Communication network security is a defence against unwanted system modifications to
access files and folders within a computer network. The increasing overlap between the …

A Web-based Blood Bank System for Managing Records of Donors and Receipts

M Kaur, N Nazir, N Kaur, SF Ali… - 2022 International …, 2022 - ieeexplore.ieee.org
The Online Blood Donation Management System, the purpose of which is to act as a bridge
between a person who needs blood, a patient, and a blood donor. The design of an …

[HTML][HTML] Security review in internet of things

F Ali, MS Khan, H Akhtar - Internet of Things and Cloud Computing, 2019 - ajtaab.org
In this decade, the exceedingly rising state of the art industry is internet of things where
trillion devices will be connected. IoT is being appraised to transform the concept of …

A review on security problems and measures of Internet of Things

H Verma, K Chahal - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) plays a significant role as it includes traditional appliances as well as
everyday household objects. The security problems of IoT are related to spacious …

A Modified leach protocol in wireless sensor networks for energy efficient routing protocol

S Kumawat, H Kaur, O Dahiya - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Wireless sensor network (WSN) are combination of network sensors and small (micro)
sensors. This paper proposes the enhancement of an already existing algorithm, for the …

A comparative review between modern encryption algorithms viz. DES, AES, and RSA

MP Priyanka, N Kaur, N Nazir, AA Khan… - 2022 International …, 2022 - ieeexplore.ieee.org
The Internet, a vast network of computer systems, currently connects the entire world. And
maintaining safe communication and data sharing over these networks is a significant task …

Performance Evaluation of Lightweight Cryptographic Algorithms for IoT in Healthcare

T Chinbat - 2023 - openrepository.aut.ac.nz
The significant number of objects interconnected to the Internet has grown as the Internet
has become a more critical aspect of today's society. Network access, such as the Internet, is …