Current research trends in IoT security: a systematic mapping study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

Survey on Cloud Auditing by Using Integrity Checking Algorithm and Key Validation Mechanism

M Mageshwari, R Naresh - Smart Trends in Computing and …, 2022 - Springer
Cloud computing can be used to access and storing data and delivery of different services
over the internet. Using cloud storage, users can remotely store their data. Cloud service …

A survey on mobile payment request verification over cloud using key distribution

A Saranya, R Naresh - … on Recent Trends in Computer Science …, 2022 - ieeexplore.ieee.org
Payment request examination of some of the cryptography's most widely used encryption
algorithms, with the goal of first identifying as many flaws and vulnerabilities as possible …

Decentralized data privacy protection and cloud auditing security management

M Mageshwari, R Naresh - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Decentralized data protection is becoming more important as more firms employ Cloud
resources. Securing, protecting, and processing user data are primary issues that Cloud …

The WhatsApp Based Cost-Effective Automation at Homes through Internet of Things

S Mohanraj, J Karthi, N Sridevi… - … on Smart Structures …, 2023 - ieeexplore.ieee.org
This paper highlights the necessity for using lowcost methods in automating household
appliances. Internet of Things (IoT) is the well-known technology for connecting devices over …

An improvised machine learning approach for wireless Sensor-Based healthcare applications

V Bharathi, CNS Vinoth Kumar - Mobile Computing and Sustainable …, 2022 - Springer
Abstract Medical Cyber-Physical Systems, health cloud, the Internet of Health Things (IoHT),
perceptive algorithms, block chain, big data analytics, health fog, and machine learning are …

Validate Merchant Server for secure payment using Key Distribution

A Saranya, R Naresh - … Security, Privacy and Networking: Proceedings of …, 2022 - Springer
Nowadays, growing and competitiveness of a financial sector and e-healthcare application
developed rapidly and quicker ever so that mobile payment plays a vital role to make easier …

[PDF][PDF] Mobile ad hoc networks intrusion detection in co-operative motion.

K Pazhanisamy, L Parthiban - 2021 - alinteridergisi.com
As the number of wireless devices continues to increase rapidly, mobile ad hoc networking
(MANET) has emerged as an exciting and significant technological advance. MANETs were …

[引用][C] SMS Spam Detection using Supervised Learning

N Chaurasia - Turkish Journal of Computer and Mathematics …, 2021

[引用][C] An Efficient Improving Cloud Data Storage Security Using Failure Aware Resource Scheduling Algorithm

SS Parkavi - Turkish Journal of Computer and Mathematics …, 2021