Integrating Network Security into Software Defined Networking (SDN) Architectures

SEVS Pillai, K Polimetla - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The decision for introduced green and cozy networking solutions has grown as the era
continues to evolve. With centralized network control and programmability functions …

Privacy-Preserving Network Traffic Analysis Using Homomorphic Encryption

SEVS Pillai, K Polimetla - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
Privacy and Homomorphic Encryption are effective ways for securely evaluating network
records by encrypting them with a sophisticated cryptographic algorithm. This method …

Analysis of Internet of things implementation barriers in the cold supply chain: An integrated ISM-MICMAC and DEMATEL approach

K Ahmad, MS Islam, MA Jahin, MF Mridha - Plos one, 2024 - journals.plos.org
Integrating Internet of Things (IoT) technology inside the cold supply chain can enhance
transparency, efficiency, and quality, optimize operating procedures, and increase …

Identifying Sponsored Content and Misleading Information in Native Advertising

SEVS Pillai - 2024 4th International Conference on Data …, 2024 - ieeexplore.ieee.org
Local advertising has become a popular form of online advertising, blurring the lines
between traditional commercials and editorial content. This type of advertising is often …

An Overview of Security Threats, Attack Detection and Defense for Large-Scale Multi-Agent Systems (LSMAS) in Internet of Things (IoT)

J Cai, L Weni, H Fengi, K Fangi, J Cheni… - … on Industrial Cyber …, 2024 - ieeexplore.ieee.org
With the global advancement of the Internet of Things (IoT), large-scale multi-agent systems
(LSMAS) technology has been increasingly adopted across various industries. Despite the …

Secure Decentralization: Examining the Role of Blockchain in Network Security

S Monga, P Gupta, J Logeshwaran… - 2024 2nd World …, 2024 - ieeexplore.ieee.org
Blockchain generation has emerged as a novel answer for securing decentralized networks.
This technology, which was first created for use in crypto currencies, has received enormous …

Performance Evaluation of Transport Layer Protocols in Mobile Networks

SEVS Pillai, SK Gopal - 2024 IEEE 13th International …, 2024 - ieeexplore.ieee.org
The transport layer is a vital network layer component responsible for ensuring the reliable
delivery of data between two points in a communication network. The delivery layer …

Exploring the use of artificial intelligence for automated compliant transaction processing

SR Landge, SR Gunturu, HP Josyula… - 2024 2nd …, 2024 - ieeexplore.ieee.org
This paper explores the capability of the use of synthetic Intelligence (AI) for automatic
compliant transaction processing. AI-primarily based structures can examine large volumes …

[HTML][HTML] Integrated development of the industrial chain and innovation chain of high-tech manufacturing industry based on the Internet of Things

Z Xie, W Bu, H Feng, Y Wang - Alexandria Engineering Journal, 2024 - Elsevier
This study proposes an IoT-based smart manufacturing method, which aims to improve the
integration efficiency of the industrial chain and innovation chain in high-tech manufacturing …

Exploring the Synergy between Network Security and Blockchain Technology

P Aggarwal, T Thamaraimanalan… - … (Trends and Future …, 2024 - ieeexplore.ieee.org
They may be the two critical components of current computing systems. As threats to on-line
safety continue to grow, modern solutions may be needed to shield sensitive statistics and …