Journal of Grid Computing, Год журнала: 2025, Номер 23(2)
Опубликована: Март 28, 2025
Язык: Английский
Journal of Grid Computing, Год журнала: 2025, Номер 23(2)
Опубликована: Март 28, 2025
Язык: Английский
International Journal of Computational and Experimental Science and Engineering, Год журнала: 2025, Номер 11(1)
Опубликована: Янв. 5, 2025
In the rapidly evolving landscape of cloud computing, burgeoning growth and centralization data exacerbate security vulnerabilities, necessitating robust scalable cryptographic solutions. This paper introduces QP-ChainSZKP framework, a novel architecture that amalgamates Quantum-Secure Cryptographic Algorithms with Zero-Knowledge Proof Management to shield environments against both classical emerging quantum threats. The proposed framework effectively integrates advanced techniques, enhancing protocols compliance measures required for operations. ensures not only adherence high-security standards but also provides strong protection breaches unauthorized access, crucial maintaining integrity confidentiality in environments. We employ dual approach our methodology by simulating rigorously testing evaluate its security, scalability, performance metrics. experimental results demonstrate significant enhancement transaction throughput reduction latency, corroborating framework’s capability manage high applications effectively. Specifically, achieves improvement 20% latency 30% under peak load scenarios, establishing efficacy handling dynamic Notably, addresses future computational threats modifying existing practices used public clouds, setting pioneering standard using technologies security. Our study contributes scalable, quantum-resistant solution tailored extensive applications, marking substantial advancement computing frameworks can meet imminent global requirements.
Язык: Английский
Процитировано
4Journal of Cloud Computing Advances Systems and Applications, Год журнала: 2025, Номер 14(1)
Опубликована: Янв. 11, 2025
To facilitate flexible manufacturing, modern industries have incorporated numerous modular operations such as multi-robot services which can be expediently arranged or offloaded to other production resources. However, complex manufacturing projects often consist of multiple tasks with fixed sequences, posing a significant challenge for smart factories in efficiently scheduling limited robot resources complete specific tasks. Additionally, when span across factories, ensuring faithful execution contracts becomes another challenge. In this paper, we propose modified combinatorial auction method combined blockchain and edge computing technologies organize project scheduling. Firstly, transform efficient resource into resource-constrained multi-project problem (RCPSP). Subsequently, the solution integrates random sampling (CA-RS) contracts. Alongside security analysis, simulations are conducted using real data sets. The results indicate that suggested CA-RS approach significantly enhances efficiency arrangement within industrial Internet Things compared baseline algorithms.
Язык: Английский
Процитировано
3Applied Sciences, Год журнала: 2024, Номер 14(2), С. 479 - 479
Опубликована: Янв. 5, 2024
This study introduces a sophisticated intrusion detection system (IDS) that has been specifically developed for internet of things (IoT) networks. By utilizing the capabilities long short-term memory (LSTM), deep learning model renowned its proficiency in modeling sequential data, our effectively discerns between regular network traffic and potential malicious attacks. In order to tackle issue imbalanced which is prevalent concern development systems (IDSs), we have integrated synthetic minority over-sampling technique (SMOTE) into approach. incorporation allows accurately identify infrequent incursion patterns. The rebalancing dataset accomplished by SMOTE through generation samples belonging class. Various strategies, such as utilization generative adversarial networks (GANs), put forth data imbalance. However, (synthetic technique) presents some distinct advantages when applied detection. characterized simplicity proven efficacy across diverse areas, including implementation this approach straightforward does not necessitate intricate training techniques (GANs). interpretability lies ability generate are aligned with properties original rendering it well suited security applications prioritize transparency. widely embraced field research, demonstrating effectiveness augmenting capacities (IDSs) reducing consequences class conducted thorough assessment three commonly utilized public datasets, namely, CICIDS2017, NSL-KDD, UNSW-NB15. findings indicate LSTM-based (IDS), conjunction address imbalance, outperforms existing methodologies detecting intrusions. provide significant contributions domain security, presenting proactive adaptable safeguarding against advanced cyberattacks. Through mitigation imbalance using SMOTE, AI-driven enhances networks, hence facilitating wider IoT technologies many industries.
Язык: Английский
Процитировано
17Human-Centric Intelligent Systems, Год журнала: 2024, Номер 4(2), С. 187 - 205
Опубликована: Май 13, 2024
Abstract Protagonists allege that artificial intelligence (AI) is revolutionising contemporaneous mindscapes. Here, we authoritatively review the status quo of AI and machine learning application in irrigated agriculture, evaluating potential of, challenges associated with, a wide range existential approaches. We contend aspiring developers irrigation systems may benefit from human-centred AI, nascent algorithm captures diverse end-user views, behaviours actions, potentially facilitating refinement proposed through iterative stakeholder feedback. AI-guided human–machine collaboration can streamline integration user needs, allowing customisation towards situational farm management adaptation. Presentation big data intuitive, legible actionable forms for specialists laypeople also urgently requires attention: here, AI-explainable interpretability help harness human expertise, enabling end-users to contribute their experience within an pipeline bespoke outputs. Transfer holds promise contextualising place-based agroecological regions, production or enterprise mixes, even with limited inputs. find rate scientific software development recent times has outpaced evolution adequate legal institutional regulations, often social, moral ethical license operate, revealing consumer issues ownership, legitimacy trust. opine great elicit sustainable outcomes food security, social innovation environmental stewardship, albeit such more likely be realised concurrent appropriate ethical, dimensions.
Язык: Английский
Процитировано
16International Journal of Intelligent Computing and Cybernetics, Год журнала: 2024, Номер 17(2), С. 436 - 464
Опубликована: Март 21, 2024
Purpose Software defect prediction (SDP) is a critical aspect of software quality assurance, aiming to identify and manage potential defects in systems. In this paper, we have proposed novel hybrid approach that combines Grey Wolf Optimization with Feature Selection (GWOFS) multilayer perceptron (MLP) for SDP. The GWOFS-MLP model designed optimize feature selection, ultimately enhancing the accuracy efficiency Optimization, inspired by social hierarchy hunting behavior grey wolves, employed select subset relevant features from an extensive pool predictors. This study investigates key challenges traditional SDP approaches encounter proposes promising solutions overcome time complexity curse dimensionality reduction problem. Design/methodology/approach integration GWOFS MLP results robust can adapt diverse datasets. selection process harnesses cooperative allowing exploration combinations. selected are then fed into MLP, powerful artificial neural network (ANN) known its capability learn intricate patterns within metrics. serves as predictive engine, utilizing curated set classify accurately. Findings performance evaluation on real-world dataset demonstrates effectiveness. achieves remarkable training 97.69% testing 97.99%. Additionally, receiver operating characteristic area under curve (ROC-AUC) score 0.89 highlights model’s ability discriminate between defective defect-free components. Originality/value Experimental implementations using machine learning-based techniques conducted validate solutions. goal enhance SDP’s accuracy, relevance efficiency, improving assurance processes. confusion matrix further illustrates performance, only small number false positives negatives.
Язык: Английский
Процитировано
13International Journal of Information Technology, Год журнала: 2024, Номер 16(4), С. 2053 - 2067
Опубликована: Фев. 29, 2024
Язык: Английский
Процитировано
12The Journal of Supercomputing, Год журнала: 2024, Номер 80(8), С. 11491 - 11555
Опубликована: Янв. 27, 2024
Язык: Английский
Процитировано
11Journal of Science and Technology Policy Management, Год журнала: 2024, Номер unknown
Опубликована: Фев. 15, 2024
Purpose In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses individuals, this bibliometric study focuses on a critical yet understudied aspect, i.e. cybersecurity. As IoT adoption grows, so do concerns regarding user privacy data security. This aims provide comprehensive understanding current research vital area, shedding light trends, gaps emerging themes. Design/methodology/approach The conducted analysis systematic review literature spanning over two decades (2013–2023). Bibliometric is using Biblioshiny which R-software-based advanced analytical tool. Further, VOSviewer used conduct network analysis. highlights evolving landscape cybersecurity, emphasizing interdisciplinary intersections ethical dimensions technologies. Findings uncovers crucial related adoption, urgent need cybersecurity protocols. It identifies themes such as artificial intelligence blockchain integration, indicating shift toward solutions. Furthermore, discussions, importance responsible innovation. Research limitations/implications Businesses can bolster their strategies, policymakers craft informed regulations researchers are encouraged explore IoT’s dimensions. Originality/value pioneers nuanced filling gap existing business management literature. By synthesizing decade scholarly work, it provides foundational insights researchers, policymakers. not only informs academic discourse but also offers practical guidance enhancing security measures fostering
Язык: Английский
Процитировано
10Security and Privacy, Год журнала: 2025, Номер 8(2)
Опубликована: Март 1, 2025
ABSTRACT In Software‐Defined Networking (SDN), the routing process involves packet forwarding based on flow rules managed by controller. However, attackers could exploit this situation launching Distributed Denial of Service (DDoS) attacks using spoofed source addresses, which can overwhelm controller with a large number fake packets. Most prior works in scenario are an address binding method; each coming from host_port switch is checked against entries table. This table consists actual host attached to host_port. approach identify points within short time; however, it suffers high overhead because needs be matched context, we propose Hybrid Defense System (HDS) two‐stage detection method. first stage, lightweight entropy‐based method detects spoofing network traffic, process, significantly reduces checking every If attack detected, second stage gets activated, time‐based identifies attacks. Thereafter, mitigation blocks HDS implemented Floodlight and evaluated different networking scenarios Mininet. Our experimental results show that 10%–12%, lowers False Positive Rate 20%, Negative 10% comparison existing methods.
Язык: Английский
Процитировано
1Опубликована: Фев. 9, 2024
The Internet of Things (IoT) is a pivotal technology with far-reaching potential to enhance various facets human life, spanning industries such as healthcare, automotive, agriculture, and education. However, its heterogeneous data landscape necessitates systematic examination IoT security challenges. To ensure end-to-end secure transmission, paradigm shift in application architecture imperative. This study meticulously investigates the intricacies transmission security, encompassing limitations, requirements, encryption methods, key management, protocols. Access control authentication mechanisms are also scrutinized fortify integrity. primary aim this paper comprehensively explore address critical securing IoT, showcasing real-world applications, underlining paramount importance transformative technological landscape.
Язык: Английский
Процитировано
9