Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 13 Nov 2024Bibliometrics
Skip Table Of Content Section
article
Using Supervised Learning to Detect Command and Control Attacks in IoT

The rapid proliferation of internet of things (IoT) devices has ushered in a new era of technological development. However, this growth has also exposed these devices to various cybersecurity risks, including command and control (C&C) attacks. C&C ...

article
Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques

The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective access control models in the cloud-based metaverse. It explores its distinct ...

article
Software Engineering for Developing a Cloud Computing Museum-Guide System

The aim of this article proposes an innovative solution for developing a museum-guide system, which employs a voice-activated assistant paired with 3-D hologram displays, that utilizes Amazon web services (AWS) to enhance the visitor experience at the ...

article
Detecting Ambiguities in Requirement Documents Written in Arabic Using Machine Learning Algorithms

The identification of ambiguities in Arabic requirement documents plays a crucial role in requirements engineering. This is because the quality of requirements directly impacts the overall success of software development projects. Traditionally, ...

article
Custom Network Protocol Stack for Communication Between Nodes in a Cloudlet System

With the advent of internet of things (IoT), new network paradigms have emerged. One such technology is cloudlets. Cloudlets are being increasingly used in various IoT-based applications such as smart homes, smart cities, healthcare, and industrial ...

article
A Distributed Cloud Architecture Based on General De Bruijn Overlay Network

Distributed cloud systems enable the distribution of computing resources across various geographical locations. While offering benefits like accelerated content delivery, the scalability and coherence maintenance of these systems pose significant ...

article
IIoT Protocols for Edge/Fog and Cloud Computing in Industrial AI: A High Frequency Perspective

Various industrial applications deal with high-frequency data. Traditionally, these systems have analyzed high-frequency data directly on the data source or at the commanding PLC. However, currently, Industry 4.0 technologies support new monitoring ...

article
Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting

Machine learning has become ubiquitous across industries for its ability to uncover in- sights from data. This research explores the application of machine learning for identifying phishing websites. The efficiency of different algorithms at classifying ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.