- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Context-Aware Activity Recognition Systems
- Advanced Neural Network Applications
- Advanced Malware Detection Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Water Quality Monitoring Technologies
- Blockchain Technology Applications and Security
- User Authentication and Security Systems
- Smart Agriculture and AI
- IoT-based Smart Home Systems
- Transportation Planning and Optimization
- Chaos-based Image/Signal Encryption
- Video Surveillance and Tracking Methods
- Emotion and Mood Recognition
- Recommender Systems and Techniques
- Internet of Things and AI
- Big Data and Business Intelligence
- Digital Transformation in Industry
- Advanced Authentication Protocols Security
- Computer Science and Engineering
- Web Data Mining and Analysis
- COVID-19 diagnosis using AI
- Traffic Prediction and Management Techniques
- Vehicle License Plate Recognition
Amity University
2017-2025
Amity University
2018-2024
Computer Algorithms for Medicine
2023
University of Lucknow
2021
Crimes committed online rank among the most critical global concerns. Daily, they cause country and citizen economies to suffer massive financial losses. With proliferation of cyber-attacks, cybercrime has also been on rise. To effectively combat cybercrime, it is essential identify its perpetrators understand their methods. Identifying preventing cyber-attacks are difficult tasks. these concerns, however, new research produced safety models forecast tools grounded artificial intelligence....
Internet of Things (IoT) applications, such as e-healthcare departments have grown tremendously where devices gather patient data and instantly transmit it over a distance to servers. Despite its huge advantages, IoT in the healthcare sector has acquired little consideration, largely because threats unauthorized access private health made possible by weak wireless communication channel. The economic complexity current security protocols makes them inappropriate, hence new must be developed...
Automation and control systems are becoming more networked thanks to the Industrial Internet of Things (IIoT). The SCADA network has also developed into a open interconnected system. In addition, by connecting industrial electronic devices network, interconnectivity efficiency methods have been significantly increased owing monitoring benefits SCADA. system is inextricably linked public security breaches cyber-attacks legitimate worry for We propose deter attackers from launching distributed...
This study aims to set up a system that will watch for leaks of liquid petroleum gas in both homes and businesses. data update through IoT connectivity the user's web browser case leak. Using IoT, user may keep constant eye on data. The MQ06 sensor is detector sensitive LPG. LPG detected using an Arduino-based Internet-of- Things (IoT) leak detection device. Interfacing with Arduino main focus this research study. sends signal microcontroller. microcontroller link indicator light (LED),...
Smart Grid Technology has to tighten its security because of the growing threat cyberattacks. Machine learning approaches are more effective in detecting assaults than conventional methods. The difficulties hostile activity and infiltration intelligent grid communication networks were investigated with machine techniques. In this work, we apply methods determine if measurements came from an attack or a secure environment. By using several methods, including Perceptron, Logistic Regression,...
The industry 4.0 defines a new era of much efficient and intelligent manufacturing processes that works in integration with other advanced technologies like AI, Big data, Block chain, etc. smart has remarkably evolved due to cyber-physical systems (CPS), Internet Things (IoT), digital twins makes up highly connected infrastructure where data flows real time. However, the involvement these also significantly increased exposure cyber threats. This article investigates several security...
The Internet of Things (IoT) is a network computing devices that can transmit and obtain data across without human intervention. In the last couple decades, software communication technology have advanced tremendously, resulting in considerable increase IoT devices. rapid expansion has raised security privacy issues. Threats malware attacks on increased dramatically recently. Hence, this paper, we proposed novel detection framework based machine learning using Genetic Cascaded Support Vector...
Deep learning is playing a vital role in most of the applications being used today's technological era. There seems to be no application where use deep concepts has not been yet. One such detection number plates vehicles on roads. The incidence automobile crashes greatly expanded along with population growth. Their needs system that could automatically detect vehicle's plate whenever necessary. situation arises when any rider does obey traffic rules, or skips signals indulges other sort...