Grow of artificial intelligence to challenge security in IoT application

M Padmaja, S Shitharth, K Prasuna… - Wireless Personal …, 2022 - Springer
Artificial intelligence is intelligence revealed by software, as opposed to natural intelligence.
It is the science and technology of intelligent machinery. It is also a technology that functions …

Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection

R Arunachalam, EDR Kanmani - Computers & Security, 2024 - Elsevier
Abstract In Wireless Sensor Networks (WSNs), one of the most significant threats is vampire
attacks in sensor nodes. These attacks are marked by malicious behaviors within sensor …

Board characteristics and audit quality: the moderating effect of board independence change

FA Almaqtari, NHS Farhan, WM Alahdal… - Cogent Social …, 2024 - Taylor & Francis
This study investigates the impact of board characteristics and bank-specific factors on audit
quality in Indian listed banks. The sample size consists of 38 banks listed on the Bombay …

The Determinants of Audit Quality and Impact on Overall Audit Performance

LPL Cavaliere, DSK Rakesh, I Muda, A Polisetty… - Nveo-Natural Volatiles & …, 2021 - nveo.org
Investing in banks has been harmed lately by a number of accounting scandals, one of
which included Bank Al Madina. Additionally, it was determined that the low quality of …

IoT based Soldier Health and Position Tracking System

JL Prasanna, MR Kumar, C Santhosh… - 2022 6th …, 2022 - ieeexplore.ieee.org
In the present scenario, the countries' security depends on the army. In this aspect, their
respective more solid health and tracking are more crucial to defend themselves. In this …

[PDF][PDF] Hybrid Mobile Ad-Hoc Delay Tolerant Network for Optimum Routing in Wireless Sensor Networks

CR Rathish, P Prakasam - International Journal of Innovative …, 2019 - researchgate.net
Due to some misbehaving nodes in Mobile Ad-hoc networks (MANETs), data is lost or false
data is delivered. In order to detect and re-configure the path from the source to terminal, Ad …

[PDF][PDF] A research for the determinants leading for counterfeit purchase and a genuine product

K Mangalasserri, R Regin… - Turkish Journal of …, 2021 - researchgate.net
Product quality is ensured by the use of well-known brand names. Because customers may
be unable to distinguish between a counterfeit and a genuine product, counterfeits cause …

[PDF][PDF] An energy efficient distributed route selection approach for minimizing delay in WSNs

CR Rathish, NA Natraj, P Sindhuja… - Solid State …, 2020 - researchgate.net
The key feature of sensor nodes is to systematically collect information from diverse nodes
inside the network and then transmitting the gathered data to the base station. Reliability of …

Digital engineering audit management strategy based on machine learning combined with wireless communication network

J Li - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
In response to the evolving landscape of the modern era, the requirements for engineering
audit have undergone significant changes. To achieve efficient audit tasks and obtain …

A Novel Approach to Detect and Prevent Data Leakage in IoT using Blockchain Technology

M NAVANEETHAN, S Janakiraman - 2022 - researchsquare.com
Abstract The Internet of Things is the next step in the evolution of communication and
business (IoT). Real-world objects can create, receive, and exchange data in a seamless …