- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
- Advanced Malware Detection Techniques
- COVID-19 epidemiological studies
- Metaheuristic Optimization Algorithms Research
- Cloud Data Security Solutions
- Cybercrime and Law Enforcement Studies
- Privacy, Security, and Data Protection
- Digital and Cyber Forensics
- Internet of Things and AI
- Religion and Sociopolitical Dynamics in Nigeria
- Spam and Phishing Detection
Birla Institute of Technology, Mesra
2022-2023
Deen Dayal Upadhyaya Gorakhpur University
2022
Abstract The security provisions for capricious data in a dynamic environment must be fathomed by prudence. It is strenuous to manage gigantic an ossified through one server. authors have put their concern on the risk susceptible Mobile Edge distributed environment. Thus, edge computing turns out excellent perspective which training can done at Edge-based amalgamation of and Blockchain association with machine learning techniques foster security, mitigate exposed data, further alleviate...
One of the fiendishly difficult tasks to perform in this computational era is deceit detection credit and debit cards. In current online digital recognising authentic identities important for e-commerce websites so that genuine fraudulent people could be segregated efficiently. paper, logistic regression (LR) n-fold intelligent machine learning (IML) techniques are used preventing detecting fraud cloud IoT connected surroundings. During experimental analysis, authors observed methodology...
The security provisions for capricious data in a dynamic environment must be fathomed by prudence. It is strenuous to manage gigantic an ossified through one server. authors have put their concern on the risk susceptible Mobile Edge distributed environment. Thus, edge computing turns out excellent perspective which training can done at Edge-based amalgamation of and Blockchain association with machine learning techniques foster security, mitigate exposed data, further alleviate breach....