Machine learning adoption in blockchain-based smart applications: The challenges, and a way forward

S Tanwar, Q Bhatia, P Patel, A Kumari, PK Singh… - IEEE …, 2019 - ieeexplore.ieee.org
In recent years, the emergence of blockchain technology (BT) has become a unique, most
disruptive, and trending technology. The decentralized database in BT emphasizes data …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Machine Learning Adoption in Blockchain-Based Smart Applications

V Suthar, V Bansal, CS Reddy… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The development of blockchain technology (BT) in recent years has made it a distinctive,
revolutionary, and popular innovation. Information security and confidentiality are prioritised …

Cloud computing security challenges and related defensive measures: A survey and taxonomy

N Chuka-Maduji, V Anu - SN Computer Science, 2021 - Springer
Existing classification systems of cloud computing security challenges have mostly excluded
human error as a major root cause of cloud security issues. Therefore, we propose a new …

Application-aware firewall mechanism for software defined networks

FN Nife, Z Kotulski - Journal of Network and Systems Management, 2020 - Springer
Abstract Software-Defined-Networking (SDN) has been recently arising as a new technology
in the IT industry. It is a network architecture that hopes to provide better solutions to most of …

Automated and intelligent systems for next-generation-based smart applications

HR Deekshetha, AK Tyagi - Data Science for Genomics, 2023 - Elsevier
The development of artificial intelligence (AI) systems is fraught with difficulties. These
include limited resources, a lack of field expertise, practicality, and a slew of other …

All-optical matching structure for multi-order modulation formats

Z Shi, X Li, H Shi, Y Liu, K Guo, S Huang - Optical Engineering, 2023 - spiedigitallibrary.org
With the development and popularity of the Internet, network security has become a popular
topic. The traditional solution for screening the security of network information is to convert …

Deep Packet Inspection in Firewall Clusters

R Hamilton, W Gray, C Sibanda… - 2020 28th …, 2020 - ieeexplore.ieee.org
Clusters of firewalls is an architecture that can enhance cyber security and protect from
network attackers. Deep Packet Inspection (DPI) is a sophisticated method used in firewalls …

[PDF][PDF] Review of embedded systems security

CC Duru, ACO Azubogu… - UNIZIK Journal of …, 2020 - journals.unizik.edu.ng
Review of embedded systems security Page 1 JEAS ISSN: 1119-8109 Journal of Engineering
and Applied Sciences, Volume 17, Number 2, December 2020, 196-206 Review of embedded …

[PDF][PDF] 高速光子防火墙关键技术综述

黄善国, 李新, 唐颖, 郭俊峰 - 通信学报, 2019 - infocomm-journal.com
为了维护光网络安全, 亟需研究部署能够有效处理高速光信号的光子防火墙,
以替代现有的高能耗的电子防火墙. 在介绍光子防火墙原理的基础上, 基于相关运算和逻辑门2 …