[PDF][PDF] A New Technique For Detecting Email Spam Risks Using LSTM-Particle Swarm Optimization Algorithms

T ALKHDOUR, R ALRAWASHDEH… - Journal of Theoretical …, 2024 - researchgate.net
Unwanted email spam involves sending messages to numerous recipients, typically to
market products, services, or scams without the recipient's consent. These messages often …

[PDF][PDF] IMPROVING SECURE ROUTING IN IOMT: ENHANCED BLOCKCHAIN CYBERSECURITY SCHEME USING HYPERLEDGER FABRIC

T ALKHDOUR, MA ALMAIAH, A ALI, R AL-ALI… - Journal of Theoretical …, 2024 - jatit.org
ABSTRACT The Internet of Medical Things (IOMT) has emerged as a transformative
technology in the healthcare sector, enabling seamless monitoring and management of …

A Secure Image Protection for IoT Applications Using Watermarking Technique and Non-Linear Henon Chaos

S Rajendran, M Doraipandian - Advanced Applications in Osmotic …, 2024 - igi-global.com
In the digital IoT world, image watermarking has been determined as a solution of copyright
problems and protecting the sensitive images from unauthorized access. A novel invisible …

From Theory to Practice: A Comprehensive Review of Osmotic Computing

P Umamaheswari - Advanced Applications in Osmotic Computing, 2024 - igi-global.com
In the evolving landscape of distributed computing, the integration of edge devices with
traditional cloud infrastructures necessitates innovative approaches to harness their …