Botnets unveiled: A comprehensive survey on evolving threats and defense strategies
M Asadi, MAJ Jamali, A Heidari… - Transactions on …, 2024 - Wiley Online Library
Botnets have emerged as a significant internet security threat, comprising networks of
compromised computers under the control of command and control (C&C) servers. These …
compromised computers under the control of command and control (C&C) servers. These …
A one stream three-dimensional convolutional neural network for fire recognition based on spatio-temporal fire analysis
Fires are among the most frequent disasters, causing serious injuries and extensive property
destruction. In order to prevent the uncontrolled spread of fires, recognizing fires accurately …
destruction. In order to prevent the uncontrolled spread of fires, recognizing fires accurately …
Optimized auxiliary physics neural network based multi-target detection for edge-cloud in smart internet of things
B Prabha, M Yaramadhi, A Sharma… - Peer-to-Peer Networking …, 2025 - Springer
Achieving effective multi-target detection in edge-cloud environments within the Smart
Internet of Things (SIoT) poses a number of issues, especially in dealing with dynamic IoT …
Internet of Things (SIoT) poses a number of issues, especially in dealing with dynamic IoT …
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system
SVN Kumar - Peer-to-Peer Networking and Applications, 2025 - Springer
The increasing frequency of network attacks poses a significant challenge in maintaining
network security. In response to security vulnerabilities, the employment of Intrusion …
network security. In response to security vulnerabilities, the employment of Intrusion …
Implementation of EEG Signal Decomposition and Feature Extraction Through Efficient Wavelet Transforms
P Pavithara, C Kalaivanan… - … and Internet of …, 2024 - ieeexplore.ieee.org
In the diagnosis of brain and mental disorders and anomalies, Electroencephalogram (EEG)
analysis plays a critical role. There are five bands of EEG signal namely Alpha, Gamma …
analysis plays a critical role. There are five bands of EEG signal namely Alpha, Gamma …
Performance Improvement of Lithium-ion Battery for Battery EVs
To maintain optimal battery performance and endurance, it is critical to understand the
complex interplay between the chemical and physical components that determine how they …
complex interplay between the chemical and physical components that determine how they …
Intelligent Automation in Long Vehicles through LDR Sensor Technology for Accident Prevention
Transportation plays a significant role in everyday life. Moving individuals or goods from one
location to another is called transportation. The import and export of goods significantly …
location to another is called transportation. The import and export of goods significantly …
Low Power and Enhanced Data Retention Time in DRAM in FinFET Technology
K Sathyasree, KK Kumar, S Sivaselvi… - … and Internet of …, 2024 - ieeexplore.ieee.org
Modern technologies require huge amounts of storage space and fast access to data for
uninterrupted high-quality audio and video processing. Random Access Memory (RAM) …
uninterrupted high-quality audio and video processing. Random Access Memory (RAM) …
[PDF][PDF] The Random Neural Network–Based Approach and Evolutionary Intelligence Are Essential Elements of IOT–RNNEI, an Attack Detection System for IOT …
Over the past few years, there has been significant research on the Internet of Things (IOT),
with a major challenge being network security and penetration. Security solutions require …
with a major challenge being network security and penetration. Security solutions require …
The Random Neural Network–based Approach and Evolutionary Intelligence are integral components ofIOT–RNNEI, an intrusion detection system for IOT Networks
Over the past few years, there has been significant research on the Internet of Things (IOT),
with a major challenge being network security and penetration. Security solutions require …
with a major challenge being network security and penetration. Security solutions require …