Cybersecurity threats and their mitigation approaches using Machine Learning—A Review

M Ahsan, KE Nygard, R Gomes… - … of Cybersecurity and …, 2022 - mdpi.com
Machine learning is of rising importance in cybersecurity. The primary objective of applying
machine learning in cybersecurity is to make the process of malware detection more …

Machine learning and deep learning approaches in IoT

A Javed, M Awais, M Shoaib, KS Khurshid… - PeerJ Computer …, 2023 - peerj.com
The internet is a booming sector for exchanging information because of all the gadgets in
today's world. Attacks on Internet of Things (IoT) devices are alarming as these devices …

Usage of Saliency Prior Maps for Detection of Salient Object Features

VS Rao, V Mounika, NR Sai… - … on I-SMAC (IoT in Social …, 2021 - ieeexplore.ieee.org
Current headway on significant article identification is broad, progressing for the most part
from the unstable extension of Convolutional Neural Networks (CNNs). In Computer Vision …

Using DWT-DCT-SVD watermarking for securing medical images

MJ Kumar, NR Sai, RVK Reddy… - … conference on smart …, 2021 - ieeexplore.ieee.org
Telemedicine is an advanced digital application in which a huge volume of clinical
information must be transmitted safely and productively throughout the business. The …

Interest flooding attack detection method in NDN networks

V Mounika, NR Sai, V Bhavani… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
To viably identify interest flooding assault (IFA) in Named Data Networking (NDN), this paper
proposes a discovery technique for interest flooding assault dependent on chi-square test …

Analyses of 6G-Network and Blockchain-Network Application Security: Future Research Prospect

AH Annas, AA Zainuddin, AW Ramlee… - … on Perceptive and …, 2024 - journals.iium.edu.my
The evolution from 5G to 6G signifies a monumental progression in wireless communication
technology, promising enhanced capabilities and broader applications. Building on the …

[PDF][PDF] Face recognition attendance system using hog algorithm

D Prasad, C Sirisha, GL Tanuja… - Dogo Rangsang …, 2023 - journal-dogorangsang.in
Face recognition is the effective technique in this real world application. Human face
recognition is useful for the verification purposes mainly in the student attendance system …

Surveying Machine Learning in Cyberattack Datasets: A Comprehensive Analysis

AF Al-zubidi, AK Farhan… - Journal of Soft …, 2024 - jscca.uotechnology.edu.iq
Cyberattacks have become one of the most significant security threats that have emerged in
the last couple of years. It is imperative to comprehend such attacks; thus, analyzing various …

Identification of Network Data security inside the IOT by using Deep learning approach

AP Kumar, MJ Kumar, NR Sai… - 2021 Third International …, 2021 - ieeexplore.ieee.org
With an expanding number of organizations related with the web, including circulated
figuring systems and the Internet of Things (IoT), the reaction to cyberattacks has become …

[PDF][PDF] AN APPROACH TO SECURED CLOUD DATA STORAGE WITH INDUSTRIAL IOT

NR Sai, GSC Kumar, MJ Kumar - International Research Journal of …, 2021 - academia.edu
Cloud computing is the enormous stockpiling region where assets are accessible from
wherever to everybody as administration. Distributed computing is the use of various …