A value driven framework for cybersecurity innovation in transportation and infrastructure DOI Creative Commons
Lampis Alevizos,

Lalit Bhakuni,

Stefan R. Jaschke

et al.

International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown

Published: Nov. 25, 2024

Language: Английский

Novel blockchain-based framework to publish, verify, and store digital academic credentials of universities DOI

T. Munesh Chandra,

Mandeep Kaur, Nitin Rakesh

et al.

International Journal of Information Technology, Journal Year: 2024, Volume and Issue: 16(5), P. 3273 - 3281

Published: May 6, 2024

Language: Английский

Citations

4

DBDAA: Dual blockchain and decentralized identifiers assisted anonymous authentication for building IoT DOI
Xiaohua Wu, Zheng Luo, Jun Cheng

et al.

Journal of Systems Architecture, Journal Year: 2025, Volume and Issue: unknown, P. 103334 - 103334

Published: Jan. 1, 2025

Language: Английский

Citations

0

Secure and effective authentication for 5G networks (SEA-5G) using blockchain DOI

R. Bala,

R. Manoharan

Journal of Ambient Intelligence and Humanized Computing, Journal Year: 2025, Volume and Issue: unknown

Published: Feb. 3, 2025

Language: Английский

Citations

0

Deep learning technology: enabling safe communication via the internet of things DOI Creative Commons
Ramiz Salama, Hitesh Mohapatra,

Tuğşad Tülbentçi

et al.

Frontiers in Communications and Networks, Journal Year: 2025, Volume and Issue: 6

Published: Feb. 4, 2025

Introduction The Internet of Things (IoT) is a new technology that connects billions devices. Despite offering many advantages, the diversified architecture and wide connectivity IoT make it vulnerable to various cyberattacks, potentially leading data breaches financial loss. Preventing such attacks on ecosystem essential ensuring its security. Methods This paper introduces software-defined network (SDN)-enabled solution for vulnerability discovery in systems, leveraging deep learning. Specifically, Cuda-deep neural (Cu-DNN), Cuda-bidirectional long short-term memory (Cu-BLSTM), Cuda-gated recurrent unit (Cu-DNNGRU) classifiers are utilized effective threat detection. approach includes 10-fold cross-validation process ensure impartiality findings. most recent publicly available CICIDS2021 dataset was used train hybrid model. Results proposed method achieves an impressive recall rate 99.96% accuracy 99.87%, demonstrating effectiveness. model also compared benchmark classifiers, including Cuda-Deep Neural Network, Cuda-Gated Recurrent Unit, (Cu-DNNLSTM Cu-GRULSTM). Discussion Our technique outperforms existing based evaluation criteria as F1-score, speed efficiency, accuracy, precision. shows strength detection highlights potential combining SDN with learning assessment.

Language: Английский

Citations

0

Forensics and security issues in the Internet of Things DOI Creative Commons
Shams Forruque Ahmed,

Shanjana Shuravi Shawon,

Afsana Bhuyian

et al.

Wireless Networks, Journal Year: 2025, Volume and Issue: unknown

Published: March 27, 2025

Language: Английский

Citations

0

Leveraging Emerging Technologies for Smart and Secure Software Development DOI
Wasswa Shafik

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 41 - 76

Published: March 28, 2025

The integration of emerging technologies such as Blockchain, the Internet Things (IoT), and other innovative solutions is revolutionizing smart secure software development. These enhance data integrity, enable decentralization, improve interoperability across digital platforms, creating more resilient adaptive systems. Blockchain's use contracts ensures automated, transactions, while IoT facilitates real-time monitoring collection, driving better decision-making. As cybersecurity threats grow, leveraging these can scalability protection against vulnerabilities in applications. ongoing evolution tech trends presents new opportunities for building intelligent systems that meet complex demands modern

Language: Английский

Citations

0

The Role of Blockchain in Cyber Physical Systems DOI
G. Sowmya, R. Sridevi, K. Subba Rao

et al.

Advances in computer and electrical engineering book series, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 36

Published: Nov. 22, 2024

This abstract explores how blockchain enhances security, transparency, and efficiency in cyber-physical systems (CPS). It addresses CPS vulnerabilities emphasizes the need for robust security measures. explains blockchain's decentralized architecture cryptographic protocols, showing it tackles data tampering unauthorized access. The discusses various applications CPS, such as secure logging control. Real-world examples demonstrate benefits like enhanced resilience transparency. also covers implications system performance regulatory compliance, highlighting transformative potential bolstering security.

Language: Английский

Citations

1

Examining Potential for Sustainable Development through Adaptive Reuse and IoT: A Case Study of Kapurthala, India DOI
Harshpreet Kaur,

Vishal Sood,

Mona Sood

et al.

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), Journal Year: 2024, Volume and Issue: unknown, P. 1039 - 1045

Published: Feb. 28, 2024

Historical structure and spatial domains hold paramount significance within the realm of nationalism serve as essential agents in construction protection a collective sense national identity. In light flourishing 'heritage industry', these structures are simultaneously gaining popularity terms their increasing economic political significance. However, many spaces find themselves confronted with numerous challenges, encompassing neglect, vandalism, encroachment, urbanization pressures; which pose threat to aspects historical cultural The reuse areas can be perceived multifaceted discussion due existence diverse objectives pursued,, public/private nature, several values (historical, artistic, cultural, economic, etc.), presence different actors (public government representatives, architects, architectural historians, developers owners). paper deals preservation restoration such landmarks, assigning new functions - expand adjust modern requirements. A project one precinct Kapurthala city is considered examples herein. Adaptive strategies, literature review qualitative analysis presented method how create sustaining environment context promoting value buildings, ensuring that continue symbols identity, community cohesion, sustainable urban development 21st century help internet things (IoT). Furthermore, this study serves an analytical prototype for future plans conserve, redevelop, or rehabilitate expressionless manner benefit locals, tourism itself.

Language: Английский

Citations

0

The Performance Analysis of Federated Learning Methods for IoT with Big Data DOI
Anitha Govindaram,

A. Jegatheesan

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), Journal Year: 2024, Volume and Issue: unknown, P. 1158 - 1164

Published: Feb. 28, 2024

ML that creates a global framework by gathering knowledge from number of different dispersed edge clients. FL allows on-device training, keeps client information in private, and updates the frameworks. approaches presume computational capabilities at each edge-device/client, which may not always be case. Due to its inherent distributed architecture, has features make it good fit for IoT networks. Though, there are few obstacles specific FL, maximum significant is training across significantly heterogeneous data sets on devices. Numerous new studies contended minimize consequences diversity but obviously, efficacy potential resolutions concluded researched or enumerated. This because homogeneity devices designs complicated Internet Things (IoT) networks ultimately affects learning process produces conventional inappropriate straightforwardly organized. research aimed provide an introduction as well thorough examination problem statements developing issues, especially those arise when attempting implement contexts using DL techniques.

Language: Английский

Citations

0

Compatibility Analysis of Construction and Demolished Waste in the Modern Era of Sustainable Road Infrastructure DOI

Harshpreet Kaur,

Mohendra Joshi,

Mona Sood

et al.

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), Journal Year: 2024, Volume and Issue: unknown, P. 1219 - 1224

Published: Feb. 28, 2024

Construction waste is becoming a problem day by day, with ever changing human needs, architecture styles; wear 'n tear and many other reasons. Rapid industrial development disregard towards the environmental health of our surroundings will bring gift heaps excessive for coming generations. Recycling, recovering reusing being need current scenario due to lack spaces putting away in form landfills. This paper focuses on possibilities using building material next construction recycled, reused or reclaimed waste. Recycled such gravel, sand, soil, Wood, brick masonry, concrete, metal, bitumen others; can be used various methods, which has been found have highest energy saving potential. The Present study made an attempt understand change physical engineering properties Crushed Stone Aggregates, Gravels, Concrete Demolished Mortar workwaste.

Language: Английский

Citations

0