[HTML][HTML] An experimental study of iot-based topologies on MQTT protocol for agriculture intrusion detection
R Chakravarthy - Measurement: Sensors, 2022 - Elsevier
Agriculture is the backbone of the country. Half of the world population depends on
agriculture and agriculture based products. Growth of the agriculture is mainly affected by …
agriculture and agriculture based products. Growth of the agriculture is mainly affected by …
[HTML][HTML] Location Privacy Protection in Edge Computing: Co-Design of Differential Privacy and Offloading Mode
G Zhang, S Zhang, Z Man, C Cui, W Hu - Electronics, 2024 - mdpi.com
Edge computing has emerged as an innovative paradigm that decentralizes computation to
the network's periphery, empowering edge servers to manage user-initiated complex tasks …
the network's periphery, empowering edge servers to manage user-initiated complex tasks …
Data scientific approach to detect the DoS attack, Probe attack, R2L attack and U2R attack
R Sakthiprabha, S Sivasundarapandian… - … on Advances in …, 2023 - ieeexplore.ieee.org
Data reliability is compromised by various cyber-attacks. Computational infrastructure is
completely disturbed, broken or guided by these attacks. The current status of cyberspace …
completely disturbed, broken or guided by these attacks. The current status of cyberspace …
Authentication of legitimate checks and detection of fake checks for reducing the Scams using Block chain based technology
V Vedanarayanan, R Sakthiprabha… - … on Advances in …, 2023 - ieeexplore.ieee.org
Fake scams are one of the most common attacks used to combat customer scams. Currently,
there is no immediate response to test certification and detection of fake tests. Instead, banks …
there is no immediate response to test certification and detection of fake tests. Instead, banks …