Grow of artificial intelligence to challenge security in IoT application
M Padmaja, S Shitharth, K Prasuna… - Wireless Personal …, 2022 - Springer
Artificial intelligence is intelligence revealed by software, as opposed to natural intelligence.
It is the science and technology of intelligent machinery. It is also a technology that functions …
It is the science and technology of intelligent machinery. It is also a technology that functions …
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection
R Arunachalam, EDR Kanmani - Computers & Security, 2024 - Elsevier
Abstract In Wireless Sensor Networks (WSNs), one of the most significant threats is vampire
attacks in sensor nodes. These attacks are marked by malicious behaviors within sensor …
attacks in sensor nodes. These attacks are marked by malicious behaviors within sensor …
Board characteristics and audit quality: the moderating effect of board independence change
This study investigates the impact of board characteristics and bank-specific factors on audit
quality in Indian listed banks. The sample size consists of 38 banks listed on the Bombay …
quality in Indian listed banks. The sample size consists of 38 banks listed on the Bombay …
The Determinants of Audit Quality and Impact on Overall Audit Performance
Investing in banks has been harmed lately by a number of accounting scandals, one of
which included Bank Al Madina. Additionally, it was determined that the low quality of …
which included Bank Al Madina. Additionally, it was determined that the low quality of …
IoT based Soldier Health and Position Tracking System
JL Prasanna, MR Kumar, C Santhosh… - 2022 6th …, 2022 - ieeexplore.ieee.org
In the present scenario, the countries' security depends on the army. In this aspect, their
respective more solid health and tracking are more crucial to defend themselves. In this …
respective more solid health and tracking are more crucial to defend themselves. In this …
[PDF][PDF] Hybrid Mobile Ad-Hoc Delay Tolerant Network for Optimum Routing in Wireless Sensor Networks
CR Rathish, P Prakasam - International Journal of Innovative …, 2019 - researchgate.net
Due to some misbehaving nodes in Mobile Ad-hoc networks (MANETs), data is lost or false
data is delivered. In order to detect and re-configure the path from the source to terminal, Ad …
data is delivered. In order to detect and re-configure the path from the source to terminal, Ad …
[PDF][PDF] A research for the determinants leading for counterfeit purchase and a genuine product
K Mangalasserri, R Regin… - Turkish Journal of …, 2021 - researchgate.net
Product quality is ensured by the use of well-known brand names. Because customers may
be unable to distinguish between a counterfeit and a genuine product, counterfeits cause …
be unable to distinguish between a counterfeit and a genuine product, counterfeits cause …
[PDF][PDF] An energy efficient distributed route selection approach for minimizing delay in WSNs
The key feature of sensor nodes is to systematically collect information from diverse nodes
inside the network and then transmitting the gathered data to the base station. Reliability of …
inside the network and then transmitting the gathered data to the base station. Reliability of …
Digital engineering audit management strategy based on machine learning combined with wireless communication network
J Li - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
In response to the evolving landscape of the modern era, the requirements for engineering
audit have undergone significant changes. To achieve efficient audit tasks and obtain …
audit have undergone significant changes. To achieve efficient audit tasks and obtain …
A Novel Approach to Detect and Prevent Data Leakage in IoT using Blockchain Technology
M NAVANEETHAN, S Janakiraman - 2022 - researchsquare.com
Abstract The Internet of Things is the next step in the evolution of communication and
business (IoT). Real-world objects can create, receive, and exchange data in a seamless …
business (IoT). Real-world objects can create, receive, and exchange data in a seamless …