Blockchain enabled cyber security: A comprehensive survey
A Deshmukh, N Sreenath, AK Tyagi… - 2022 International …, 2022 - ieeexplore.ieee.org
This paper identifies research paths for blockchain in cyber security that need further
research: Internet of Things (IoT) security has indeed been promoted as a critical industrial …
research: Internet of Things (IoT) security has indeed been promoted as a critical industrial …
The role of machine learning in network anomaly detection for cybersecurity
A Yaseen - Sage Science Review of Applied Machine …, 2023 - journals.sagescience.org
This research introduces a theoretical framework for network anomaly detection in
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …
The Future of Edge Computing with Blockchain Technology: Possibility of Threats, Opportunities, and Challenges
In today's world, people need tremendous improvement in each aspect of life and they saw
so many changes that literally make their life much more simplistic. People need to access …
so many changes that literally make their life much more simplistic. People need to access …
M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning
AV Turukmane, R Devendiran - Computers & Security, 2024 - Elsevier
The intrusions are increasing daily, so there is a huge amount of privacy violations, financial
loss, illegal transferring of information, etc. Various forms of intrusion occur in networks, such …
loss, illegal transferring of information, etc. Various forms of intrusion occur in networks, such …
[HTML][HTML] Cyber Physical Systems: Analyses, challenges and possible solutions
AK Tyagi, N Sreenath - Internet of Things and Cyber-Physical Systems, 2021 - Elsevier
It is becoming more difficult to protect the authentication of our data in today's world of smart
living. On the one hand, we are able to live in smart homes and smart cities with ease. Even …
living. On the one hand, we are able to live in smart homes and smart cities with ease. Even …
[PDF][PDF] Enhancing cybersecurity: The power of artificial intelligence in threat detection and prevention
M Rizvi - … Journal of Advanced Engineering Research and …, 2023 - academia.edu
Due to its ability to evaluate security threats in real-time and take appropriate action, artificial
intelligence has emerged as a key component of cyber security. AI now has a bigger impact …
intelligence has emerged as a key component of cyber security. AI now has a bigger impact …
Artificial intelligence for cyber security: Current trends and future challenges
Artificial intelligence (AI) has helped industries and society today to become modern and
more productive. Using the Internet of Things (IoT), we can sense and transfer data through …
more productive. Using the Internet of Things (IoT), we can sense and transfer data through …
Biometric security in Internet of Things based system against identity theft attacks
GH Sai, AK Tyagi, N Sreenath - 2023 International Conference …, 2023 - ieeexplore.ieee.org
Over the years, the Internet of Things (IoT) has been gaining popularity and is being used
everywhere. The IoT has its applications extended to almost every area of technology …
everywhere. The IoT has its applications extended to almost every area of technology …
Applications of blockchain technologies in digital forensics and threat hunting
With the recent developments in many technologies, a novel concept “blockchain” was
introduced in 2009 as a cryptocurrency application by some anonymous name or group of …
introduced in 2009 as a cryptocurrency application by some anonymous name or group of …
A novel GPU based intrusion detection system using deep autoencoder with Fruitfly optimization
R Sekhar, K Sasirekha, PS Raja, K Thangavel - SN Applied Sciences, 2021 - Springer
Abstract Intrusion Detection Systems (IDSs) have received more attention to safeguarding
the vital information in a network system of an organization. Generally, the hackers are …
the vital information in a network system of an organization. Generally, the hackers are …