Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review

M Majid, S Habib, AR Javed, M Rizwan, G Srivastava… - Sensors, 2022 - mdpi.com
The 21st century has seen rapid changes in technology, industry, and social patterns. Most
industries have moved towards automation, and human intervention has decreased, which …

Email Security Issues, Tools, and Techniques Used in Investigation

E Altulaihan, A Alismail, MM Hafizur Rahman… - Sustainability, 2023 - mdpi.com
The email system is a globally distributed communication infrastructure service that involves
multiple actors playing different roles to ensure end-to-end mail delivery. It is an …

Secure routing for LEO satellite network survivability

H Li, D Shi, W Wang, D Liao, TR Gadekallu, K Yu - Computer Networks, 2022 - Elsevier
Secure routing algorithm plays an important role in the performance of LEO satellite network
survivability. However, due to the instability, openness and exposure of inter-satellite links …

Multimodal religiously hateful social media memes classification based on textual and image data

A Hamza, AR Javed, F Iqbal, A Yasin… - ACM Transactions on …, 2024 - dl.acm.org
Multimodal hateful social media meme detection is an important and challenging problem in
the vision-language domain. Recent studies show high accuracy for such multimodal tasks …

An efficient approach for textual data classification using deep learning

A Alqahtani, H Ullah Khan, S Alsubai, M Sha… - Frontiers in …, 2022 - frontiersin.org
Text categorization is an effective activity that can be accomplished using a variety of
classification algorithms. In machine learning, the classifier is built by learning the features of …

Find: privacy-enhanced federated learning for intelligent fake news detection

Z Lian, C Zhang, C Su, FA Dharejo… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The development and popularity of social networks have made information dissemination
unprecedentedly convenient and speedy. However, the spread of fake news can often …

SDOT: Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-Based Three-Tier Forensic Classification Framework

DP Joseph, P Viswanathan - IEEE Access, 2023 - ieeexplore.ieee.org
Most traditional digital forensic techniques identify irrelevant files in a corpus using keyword
search, frequent hashes, frequent paths, and frequent size methods. These methods are …

Flex-CC: A flexible connected chains scheme for multicast source authentication in dynamic SDN environment

H Eltaief - Computer Networks, 2022 - Elsevier
Multicast service has the advantage of saving the resources of senders. It ensures the
efficiency of the network by lowering network share, but it is necessary to address security …

Automatic forensic analysis of criminal navigation system using machine learning

A Ponmalar, B Renukadevi, J Anand… - 2022 1st …, 2022 - ieeexplore.ieee.org
There are many crime situations witnessed in everyday life nowadays, and they are
expanding at an alarming rate. We've been building an APP to assist police investigators …

[HTML][HTML] Identifying Persons of Interest in Digital Forensics Using NLP-Based AI

J Adkins, A Al Bataineh, M Khalaf - Future Internet, 2024 - mdpi.com
The field of digital forensics relies on expertise from multiple domains, including computer
science, criminology, and law. It also relies on different toolsets and an analyst's expertise to …