Integrating Network Security into Software Defined Networking (SDN) Architectures
SEVS Pillai, K Polimetla - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The decision for introduced green and cozy networking solutions has grown as the era
continues to evolve. With centralized network control and programmability functions …
continues to evolve. With centralized network control and programmability functions …
Privacy-Preserving Network Traffic Analysis Using Homomorphic Encryption
SEVS Pillai, K Polimetla - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
Privacy and Homomorphic Encryption are effective ways for securely evaluating network
records by encrypting them with a sophisticated cryptographic algorithm. This method …
records by encrypting them with a sophisticated cryptographic algorithm. This method …
Analysis of Internet of things implementation barriers in the cold supply chain: An integrated ISM-MICMAC and DEMATEL approach
Integrating Internet of Things (IoT) technology inside the cold supply chain can enhance
transparency, efficiency, and quality, optimize operating procedures, and increase …
transparency, efficiency, and quality, optimize operating procedures, and increase …
Identifying Sponsored Content and Misleading Information in Native Advertising
SEVS Pillai - 2024 4th International Conference on Data …, 2024 - ieeexplore.ieee.org
Local advertising has become a popular form of online advertising, blurring the lines
between traditional commercials and editorial content. This type of advertising is often …
between traditional commercials and editorial content. This type of advertising is often …
An Overview of Security Threats, Attack Detection and Defense for Large-Scale Multi-Agent Systems (LSMAS) in Internet of Things (IoT)
With the global advancement of the Internet of Things (IoT), large-scale multi-agent systems
(LSMAS) technology has been increasingly adopted across various industries. Despite the …
(LSMAS) technology has been increasingly adopted across various industries. Despite the …
Secure Decentralization: Examining the Role of Blockchain in Network Security
S Monga, P Gupta, J Logeshwaran… - 2024 2nd World …, 2024 - ieeexplore.ieee.org
Blockchain generation has emerged as a novel answer for securing decentralized networks.
This technology, which was first created for use in crypto currencies, has received enormous …
This technology, which was first created for use in crypto currencies, has received enormous …
Performance Evaluation of Transport Layer Protocols in Mobile Networks
SEVS Pillai, SK Gopal - 2024 IEEE 13th International …, 2024 - ieeexplore.ieee.org
The transport layer is a vital network layer component responsible for ensuring the reliable
delivery of data between two points in a communication network. The delivery layer …
delivery of data between two points in a communication network. The delivery layer …
Exploring the use of artificial intelligence for automated compliant transaction processing
SR Landge, SR Gunturu, HP Josyula… - 2024 2nd …, 2024 - ieeexplore.ieee.org
This paper explores the capability of the use of synthetic Intelligence (AI) for automatic
compliant transaction processing. AI-primarily based structures can examine large volumes …
compliant transaction processing. AI-primarily based structures can examine large volumes …
[HTML][HTML] Integrated development of the industrial chain and innovation chain of high-tech manufacturing industry based on the Internet of Things
Z Xie, W Bu, H Feng, Y Wang - Alexandria Engineering Journal, 2024 - Elsevier
This study proposes an IoT-based smart manufacturing method, which aims to improve the
integration efficiency of the industrial chain and innovation chain in high-tech manufacturing …
integration efficiency of the industrial chain and innovation chain in high-tech manufacturing …
Exploring the Synergy between Network Security and Blockchain Technology
P Aggarwal, T Thamaraimanalan… - … (Trends and Future …, 2024 - ieeexplore.ieee.org
They may be the two critical components of current computing systems. As threats to on-line
safety continue to grow, modern solutions may be needed to shield sensitive statistics and …
safety continue to grow, modern solutions may be needed to shield sensitive statistics and …