A frame work of security attacks, issues classifications and configuration strategy for IoT networks for the successful implementation
The IEEE 802.15. 4 standard offers a number of security requirements that provide varying
degrees of protections at the link layer. The decision of which security level to use while …
degrees of protections at the link layer. The decision of which security level to use while …
Unlocking educational frontiers: Exploring higher educators' adoption of google workspace technology tools for teaching and assessment in Lesotho dynamic …
MA Ayanwale, RR Molefi, S Liapeng - Heliyon, 2024 - cell.com
The rapid integration of google workspace tools in higher education has the potential to
transform education. To fully realize this potential, it is crucial to understand the factors that …
transform education. To fully realize this potential, it is crucial to understand the factors that …
A Comprehensive Description of Artificial Intelligence Techniques in Financial Market
VS Bhusari, S Kumar, SH Krishna… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The opportunity for improving human existence in arange of situations, including health,
education, telecommunications, finance, and business, is vast and untapped in the machine …
education, telecommunications, finance, and business, is vast and untapped in the machine …
A Detailed Review and Study of Implementation of Security System Design for Machine Learning-Based Software Systems: Issues And Challenges
M Lourens, V Tripathi, J Alanya-Beltran… - 2023 3rd …, 2023 - ieeexplore.ieee.org
The rapidly growing technology specially in the field of software, Machine Learning (ML) has
played an important role in a range of tasks, including voice, video, and computer vision. It is …
played an important role in a range of tasks, including voice, video, and computer vision. It is …
Integration of AI with the Cybersecurity: A detailed Systematic review with the practical issues and challenges
M Lourens, AP Dabral, D Gangodkar… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
Not only have there been a lot more cyberattacks in recent years, but they have also gotten
much more advanced. Therefore, developing a cyber-resilient strategy is of utmost …
much more advanced. Therefore, developing a cyber-resilient strategy is of utmost …
A sizeable empirical investigation of bug attributes in Blockchain structures
A Taneja, M Sankar, SV Akram… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Blockchain systems' credibility is severely damaged by flaws. A thorough understanding of
blockchain vulnerabilities is crucial for developing effective methods for preventing …
blockchain vulnerabilities is crucial for developing effective methods for preventing …
An Investigation Using Structural Equation Modelling on Customer Adoption of Internet of Things Assistance
A Mir, M Sankar, K Kafila, SV Akram… - 2023 3rd …, 2023 - ieeexplore.ieee.org
The development of Internet of Things-based technologies in India includes home
automation, fitness trackers devices, and smart buildings. The Internet of Things has had …
automation, fitness trackers devices, and smart buildings. The Internet of Things has had …
An effective cloud computing model enhancing privacy in cloud computing
M Chawki - Information Security Journal: A Global Perspective, 2024 - Taylor & Francis
Cloud computing revolutionizes global software, system, infrastructure, and storage
accessibility, offering flexibility and cost-effectiveness. This paper explores the pivotal …
accessibility, offering flexibility and cost-effectiveness. This paper explores the pivotal …
Blockchain in Cloud Computing: Design Challenges
SD Jondhale, SK Korde, DS Rakshe… - … on System Modeling …, 2022 - ieeexplore.ieee.org
Blockchains is an immutable network comprising data records that are shared from across
show's nodes and include all the specifics of the transactions that have transpired. Consent …
show's nodes and include all the specifics of the transactions that have transpired. Consent …
A critical analysis on the security attacks and relevant countermeasures using ML
In Side Channel Analysis (SCA), machine learning algorithms have shown their efficacy,
offering several upgrades over the well-established profiling procedure of Template Attacks …
offering several upgrades over the well-established profiling procedure of Template Attacks …