[HTML][HTML] An ensemble deep learning model for cyber threat hunting in industrial internet of things
By the emergence of the fourth industrial revolution, interconnected devices and sensors
generate large-scale, dynamic, and inharmonious data in Industrial Internet of Things (IIoT) …
generate large-scale, dynamic, and inharmonious data in Industrial Internet of Things (IIoT) …
Ai in software engineering: A survey on project management applications
T Crawford, S Duong, R Fueston, A Lawani… - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial Intelligence (AI) refers to the intelligence demonstrated by machines, and within the
realm of AI, Machine Learning (ML) stands as a notable subset. ML employs algorithms that …
realm of AI, Machine Learning (ML) stands as a notable subset. ML employs algorithms that …
Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review
S Najafli, A Toroghi Haghighat, B Karasfi - Knowledge and Information …, 2024 - Springer
Abstract The Internet of Things (IoT) has been used in various aspects. Fundamental
security issues must be addressed to accelerate and develop the Internet of Things. An …
security issues must be addressed to accelerate and develop the Internet of Things. An …
Exploring privacy measurement in federated learning
Federated learning (FL) is a collaborative artificial intelligence (AI) approach that enables
distributed training of AI models without data sharing, thereby promoting privacy by design …
distributed training of AI models without data sharing, thereby promoting privacy by design …
A bert-based recommender system for secure blockchain-based cyber physical drug supply chain management
Abstract Drug Supply Chain Management (DSCM) can be one of the most affected streams
in healthcare due to pandemics. The delivery of medicine to patients through DSCM is a …
in healthcare due to pandemics. The delivery of medicine to patients through DSCM is a …
The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …
Systemization of Knowledge (SoK)-Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives
S Makar, A Dehghantanha, F Zarrinkalam… - arXiv preprint arXiv …, 2023 - arxiv.org
Recent literature highlights a significant cross-impact between transfer learning and
cybersecurity. Many studies have been conducted on using transfer learning to enhance …
cybersecurity. Many studies have been conducted on using transfer learning to enhance …
Security and Privacy Enhancing in Blockchain-based IoT Environments via Anonym Auditing
P Khordadpour, S Ahmadi - arXiv preprint arXiv:2403.01356, 2024 - arxiv.org
The integration of blockchain technology in Internet of Things (IoT) environments is a
revolutionary step towards ensuring robust security and enhanced privacy. This paper …
revolutionary step towards ensuring robust security and enhanced privacy. This paper …
A systematic literature review on insider threats
AP Singh, A Sharma - arXiv preprint arXiv:2212.05347, 2022 - arxiv.org
Insider threats is the most concerned cybersecurity problem which is poorly addressed by
widely used security solutions. Despite the fact that there have been several scientific …
widely used security solutions. Despite the fact that there have been several scientific …
Web3. 0 Security: Privacy Enhancing and Anonym Auditing in Blockchain-based Structures
D Namakshenas - arXiv preprint arXiv:2307.12485, 2023 - arxiv.org
The advent of Web 3.0, underpinned by blockchain technologies, promises to transform the
internet's landscape by empowering individuals with decentralized control over their data …
internet's landscape by empowering individuals with decentralized control over their data …