A frame work of security attacks, issues classifications and configuration strategy for IoT networks for the successful implementation

V Bansal, S Pandey, SK Shukla, D Singh… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The IEEE 802.15. 4 standard offers a number of security requirements that provide varying
degrees of protections at the link layer. The decision of which security level to use while …

Unlocking educational frontiers: Exploring higher educators' adoption of google workspace technology tools for teaching and assessment in Lesotho dynamic …

MA Ayanwale, RR Molefi, S Liapeng - Heliyon, 2024 - cell.com
The rapid integration of google workspace tools in higher education has the potential to
transform education. To fully realize this potential, it is crucial to understand the factors that …

A Comprehensive Description of Artificial Intelligence Techniques in Financial Market

VS Bhusari, S Kumar, SH Krishna… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The opportunity for improving human existence in arange of situations, including health,
education, telecommunications, finance, and business, is vast and untapped in the machine …

A Detailed Review and Study of Implementation of Security System Design for Machine Learning-Based Software Systems: Issues And Challenges

M Lourens, V Tripathi, J Alanya-Beltran… - 2023 3rd …, 2023 - ieeexplore.ieee.org
The rapidly growing technology specially in the field of software, Machine Learning (ML) has
played an important role in a range of tasks, including voice, video, and computer vision. It is …

Integration of AI with the Cybersecurity: A detailed Systematic review with the practical issues and challenges

M Lourens, AP Dabral, D Gangodkar… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
Not only have there been a lot more cyberattacks in recent years, but they have also gotten
much more advanced. Therefore, developing a cyber-resilient strategy is of utmost …

A sizeable empirical investigation of bug attributes in Blockchain structures

A Taneja, M Sankar, SV Akram… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Blockchain systems' credibility is severely damaged by flaws. A thorough understanding of
blockchain vulnerabilities is crucial for developing effective methods for preventing …

An Investigation Using Structural Equation Modelling on Customer Adoption of Internet of Things Assistance

A Mir, M Sankar, K Kafila, SV Akram… - 2023 3rd …, 2023 - ieeexplore.ieee.org
The development of Internet of Things-based technologies in India includes home
automation, fitness trackers devices, and smart buildings. The Internet of Things has had …

An effective cloud computing model enhancing privacy in cloud computing

M Chawki - Information Security Journal: A Global Perspective, 2024 - Taylor & Francis
Cloud computing revolutionizes global software, system, infrastructure, and storage
accessibility, offering flexibility and cost-effectiveness. This paper explores the pivotal …

Blockchain in Cloud Computing: Design Challenges

SD Jondhale, SK Korde, DS Rakshe… - … on System Modeling …, 2022 - ieeexplore.ieee.org
Blockchains is an immutable network comprising data records that are shared from across
show's nodes and include all the specifics of the transactions that have transpired. Consent …

A critical analysis on the security attacks and relevant countermeasures using ML

P Upadhya, J Sangeethapriya, A Kumar… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
In Side Channel Analysis (SCA), machine learning algorithms have shown their efficacy,
offering several upgrades over the well-established profiling procedure of Template Attacks …