暂无分享,去创建一个
Praveen Kumar Reddy Maddikunta | Saurabh Singh | Thippa Reddy Gadekallu | Mohan Krishna Kagita | Navod Thilakarathne | T. Gadekallu | N. Thilakarathne | Saurabh Singh
[1] Md. Rafiqul Islam,et al. A Hybrid Wrapper-Filter Approach for Malware Detection , 1969, J. Networks.
[2] Mohan Krishna Kagita. AN UPDATED NEW SECURITY ARCHITECTURE FOR IOT NETWORK BASED ON SOFTWARE-DEFINED NETWORKING (SDN) , 2018 .
[3] Ashutosh Mitbavkar,et al. A Brief Study on Cyber Crime & Cyber Law’s of India , 2020 .
[4] Mahdi Aiash,et al. Machine Learning Based Botnet Identification Traffic , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[5] Sherali Zeadally,et al. Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges , 2017, IEEE Communications Magazine.
[6] Mohammad S. Obaidat,et al. Ensuring Privacy and Security in E- Health Records , 2018, 2018 International Conference on Computer, Information and Telecommunication Systems (CITS).
[7] Md Husamuddin,et al. Internet of Things: A study on security and privacy threats , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).
[8] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[9] Praveen Kumar Reddy Maddikunta,et al. A metaheuristic optimization approach for energy efficiency in the IoT networks , 2020, Softw. Pract. Exp..
[10] Wazir Zada Khan,et al. A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks , 2020, IEEE Access.
[11] Neeraj Kumar,et al. Security and Trust Management in MANET , 2011 .
[12] B. Prabadevi,et al. An AI-based intelligent system for healthcare analysis using Ridge-Adaline Stochastic Gradient Descent Classifier , 2020, The Journal of Supercomputing.
[13] Harshita Patel,et al. A review on classification of imbalanced data for wireless sensor networks , 2020, Int. J. Distributed Sens. Networks.
[14] Paul A. Watters,et al. Information Security Governance: The Art of Detecting Hidden Malware , 2013 .
[15] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[16] Neeraj Kumar,et al. Securing electronics healthcare records in Healthcare 4.0 : A biometric-based approach , 2019, Comput. Electr. Eng..
[17] Tero Päivärinta,et al. Genre-Based Assessment of Information and Knowledge Security Risks , 2014, 2014 47th Hawaii International Conference on System Sciences.
[18] Yang Lu,et al. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics , 2019, IEEE Internet of Things Journal.
[19] Praveen Kumar Reddy Maddikunta,et al. Predictive model for battery life in IoT networks , 2020, IET Intelligent Transport Systems.
[20] Thippa Reddy Gadekallu,et al. A Heuristic Angular Clustering Framework for Secured Statistical Data Aggregation in Sensor Networks , 2020, Sensors.
[21] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[22] Praveen Kumar Reddy Maddikunta,et al. A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU , 2020, Electronics.
[23] Jonathan Oliver,et al. Mining Malware to Detect Variants , 2014, 2014 Fifth Cybercrime and Trustworthy Computing Conference.
[24] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[25] Praveen Kumar Reddy Maddikunta,et al. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture , 2020, Comput. Commun..
[26] Michael Schiefer. Smart Home Definition and Security Threats , 2015, 2015 Ninth International Conference on IT Security Incident Management & IT Forensics.
[27] Tin Maung Maung,et al. Proposed Effective Solution for Cybercrime Investigation in Myanmar , 2017 .
[28] Praveen Kumar Reddy Maddikunta,et al. Green communication in IoT networks using a hybrid optimization algorithm , 2020, Comput. Commun..
[29] Mohan Krishna Kagita,et al. The Role of the Internet of Things in Health Care: A Systematic and Comprehensive Study , 2020, International Journal of Engineering and Management Research.
[30] Roderic Broadhurst,et al. Malicious Spam Emails Developments and Authorship Attribution , 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop.
[31] Wazir Zada Khan,et al. A deep neural networks based model for uninterrupted marine environment monitoring , 2020, Comput. Commun..
[32] Pete Burnap,et al. A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.
[33] Laurence T. Yang,et al. UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles , 2018, IEEE Network.
[34] Gautam Srivastava,et al. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.
[35] Mumbai,et al. Internet of Things (IoT): A Literature Review , 2015 .
[36] Lingfeng Wang,et al. An information flow security model for home area network of smart grid , 2013, 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems.
[37] Praveen Kumar Reddy Maddikunta,et al. Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything , 2020, J. Parallel Distributed Comput..
[38] Abdulrahman Al-Ahmari,et al. Computational System to Classify Cyber Crime Offenses using Machine Learning , 2020, Sustainability.
[39] Neeraj Kumar,et al. Secure clustering for efficient data dissemination in vehicular cyber-physical systems , 2016, Future Gener. Comput. Syst..
[40] David G. Holmberg,et al. BACnet wide area network security threat assessment , 2011 .
[41] Mohammad Sayad Haghighi,et al. Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[42] Gregory Epiphaniou,et al. Guidelines for Internet of Things Deployment Approaches - The Thing Commandments , 2013, EUSPN/ICTH.
[44] Nancy E. Marion. The Council of Europe's Cyber Crime Treaty: An exercise in Symbolic Legislation , 2010 .