DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)

S Ur Rehman, M Khaliq, SI Imtiaz, A Rasool… - Future Generation …, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks can put the communication networks
in instability by throwing malicious traffic and requests in bulk over the network. Computer …

[HTML][HTML] Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things

D Ngabo, D Wang, C Iwendi, JH Anajemba, LA Ajao… - Electronics, 2021 - mdpi.com
The recent developments in fog computing architecture and cloud of things (CoT)
technology includes data mining management and artificial intelligence operations …

Healthcare data security using IoT sensors based on random hashing mechanism

AO Khadidos, S Shitharth, AO Khadidos… - Journal of …, 2022 - Wiley Online Library
Providing security to the healthcare data stored in an IoT‐cloud environment is one of the
most challenging and demanding tasks in recent days. Because the IoT‐cloud framework is …

[HTML][HTML] A multimodal facial cues based engagement detection system in e-learning context using deep learning approach

S Gupta, P Kumar, R Tekchandani - Multimedia Tools and Applications, 2023 - Springer
Due to the COVID-19 crisis, the education sector has been shifted to a virtual environment.
Monitoring the engagement level and providing regular feedback during e-classes is one of …

Pp-spa: privacy preserved smartphone-based personal assistant to improve routine life functioning of cognitive impaired individuals

AR Javed, MU Sarwar, S ur Rehman, HU Khan… - Neural Processing …, 2023 - Springer
Mobile ubiquitous computing has not only enriched human comfort but also has a deep
impact on changing standards of human daily life. Modern inventions can be even more …

Fortifying the IoT landscape: Strategies to counter security risks in connected systems

E James, F Rabbi - Tensorgate Journal of Sustainable …, 2023 - research.tensorgate.org
The proliferation of Internet of Things (IoT) devices in our connected world has brought
unparalleled convenience and efficiency to various sectors, ranging from smart homes to …

[PDF][PDF] Advanced approach for encryption using advanced encryption standard with chaotic map

Y Alemami, MA Mohamed, S Atiewi - Int. J. Electr. Comput. Eng, 2023 - researchgate.net
At present, security is significant for individuals and organizations. All information need
security to prevent theft, leakage, alteration. Security must be guaranteed by applying some …

A secure multiuser privacy technique for wireless IoT networks using stochastic privacy optimization

JH Anajemba, T Yue, C Iwendi… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the exponential increase of interconnected communicating devices which make up the
Internet of Things (IoT), securing the network transmission and the fifth generation (5G) …

[HTML][HTML] Blockchain-secured recommender system for special need patients using deep learning

EA Mantey, C Zhou, JH Anajemba… - Frontiers in Public …, 2021 - frontiersin.org
Recommender systems offer several advantages to hospital data management units and
patients with special needs. These systems are more dependent on the extreme subtle …

[HTML][HTML] An efficient quality of services based wireless sensor network for anomaly detection using soft computing approaches

M Mittal, M Kobielnik, S Gupta, X Cheng… - Journal of Cloud …, 2022 - Springer
Wireless sensor network (WSN) is widely acceptable communication network where human-
intervention is less. Another prominent factors are cheap in cost and covers huge area of …