Federated graph neural network for privacy-preserved supply chain data sharing DOI
Xiaochuan Tang, Yu Wang, Xin Liu

et al.

Applied Soft Computing, Journal Year: 2024, Volume and Issue: unknown, P. 112475 - 112475

Published: Nov. 1, 2024

Language: Английский

Deep learning for intrusion detection in IoT networks DOI

Mehdi Selem,

Farah Jemili, Ouajdi Korbaa

et al.

Peer-to-Peer Networking and Applications, Journal Year: 2025, Volume and Issue: 18(2)

Published: Jan. 9, 2025

Language: Английский

Citations

2

An efficient convolutional neural network based attack detection for smart grid in 5G-IOT DOI

Sheeja Rani S,

Mostafa F. Shaaban, Abdelfatah Ali

et al.

International Journal of Critical Infrastructure Protection, Journal Year: 2025, Volume and Issue: unknown, P. 100738 - 100738

Published: Jan. 1, 2025

Language: Английский

Citations

1

Analysis of integration of IoMT with blockchain: issues, challenges and solutions DOI Creative Commons
Tehseen Mazhar,

Syed Faisal Abbas Shah,

A. K. M. Sarwar Inam

et al.

Discover Internet of Things, Journal Year: 2024, Volume and Issue: 4(1)

Published: Oct. 23, 2024

The incorporation of Artificial Intelligence (AI) into the fields Neurosurgery and Neurology has transformed landscape healthcare industry. present study describes seven dimensions AI that have way providing care, diagnosing, treating patients. It exhibited unparalleled accuracy in analyzing complex medical imaging data expediting precise diagnoses neurological conditions. also enabled personalized treatment plans by harnessing patient-specific genetic information, promising more effective therapies. For instance, AI-powered surgical robots brought precision remote capabilities to neurosurgical procedures, reducing human error. In AI, machine learning models predict disease progression, optimizing resource allocation patient whereas wearable devices with provide continuous monitoring, enable early intervention for chronic accelerated drug discovery vast datasets, potentially leading breakthrough Chatbots virtual assistants powered enhance engagement adherence plans. holds promise further personalization augmented decision-making, earlier intervention, development groundbreaking treatments. mainly focuses on blockchain technology provides a reasonable understanding associated issues challenges along its solutions. will allow professionals advance field contribute towards improvement an individual's well-being when facing challenges.

Language: Английский

Citations

5

Malicious Behavior Identification using Dual Attention based Dense Bi-Directional Gated Recurrent Network in the Cloud Computing Environment DOI

Nandita Goyal,

Kanika Taneja,

Shivani Agarwal

et al.

Computers & Security, Journal Year: 2025, Volume and Issue: unknown, P. 104418 - 104418

Published: March 1, 2025

Language: Английский

Citations

0

Improved attention mechanism-based transformer model for time series data-anomaly detection DOI

Avhad Kiran Sahebrao,

Gokuldhev Mony

Communication in Statistics- Theory and Methods, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 42

Published: April 1, 2025

Language: Английский

Citations

0

Integrating hybrid bald eagle crow search algorithm and deep learning for enhanced malicious node detection in secure distributed systems DOI Creative Commons

Feras Mohammed Al-Matarneh

Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)

Published: April 12, 2025

Language: Английский

Citations

0

Sustainable Approach With Cloud Transfer Methodology for Affordable Smart Grid FT Services Based on Safety Risk Identification Factor DOI
Anzar Ahmad, Kapil Joshi

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 387 - 400

Published: Feb. 28, 2025

The main objective of this paper is to introduce a methodology for security risk assessment-based migration critical Smart grid functional technology services the cloud, either on- or off-premise. By zone, baseline system architectural diagram smart control systems manufacturing (CSM) was developed. Threats cloud could come from incorrectly configured storage, unprotected APIs, data loss, breaches and leaks, access control. Numerous research groups earlier publications have extensively examined issues connected with computing. Evaluate our on two migrations case studies, namely big distribution network operator (DNO) complicated (FT) environment; small DNO that lacks FT capabilities, money, IT staff. Our method will be an invaluable resource any owner since there are no studies address issue transferring computing architecture methodically.

Language: Английский

Citations

0

Integration of Smart Grid with Industry 5.0: Applications, Challenges and Solutions DOI Creative Commons

Sunawar Khan,

Tehseen Mazhar, Tariq Shahzad

et al.

Deleted Journal, Journal Year: 2024, Volume and Issue: unknown, P. 100031 - 100031

Published: Dec. 1, 2024

Language: Английский

Citations

3

Advanced mathematical modeling of mitigating security threats in smart grids through deep ensemble model DOI Creative Commons
Sanaa Sharaf, Mahmoud Ragab,

Nasser Albogami

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: Oct. 4, 2024

Language: Английский

Citations

2

Performance analysis of a 400-Gbps DWDM-FSO system using advanced modulation formats and under adverse weather conditions DOI Creative Commons
Hafiz Muhammad Obaid,

Zaid Bin Javaid,

Tehseen Mazhar

et al.

Discover Sustainability, Journal Year: 2024, Volume and Issue: 5(1)

Published: Sept. 27, 2024

Language: Английский

Citations

1