Zobrazeno 1 - 10
of 74
pro vyhledávání: '"Maanak Gupta"'
Publikováno v:
IEEE Access, Vol 12, Pp 52727-52743 (2024)
Network slicing has emerged as a cornerstone technology within the 5G ecosystem, enabling efficient resource allocation, service customization, and support for various applications. Its ability to deliver Network-as-a-Service (NaaS) brings a new para
Externí odkaz:
https://doaj.org/article/63b37134e4ae49c9893929b01d02a05a
Publikováno v:
IEEE Access, Vol 11, Pp 80218-80245 (2023)
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models like ChatGPT and Google Bard continue to foster their complexity and capability, it’s critic
Externí odkaz:
https://doaj.org/article/94b115387cad4222ab2dce65dbb01b96
Publikováno v:
IEEE Access, Vol 11, Pp 25237-25252 (2023)
In recent years, a significant amount of research has focused on analyzing the effectiveness of machine learning (ML) models for malware detection. These approaches have ranged from methods such as decision trees and clustering to more complex approa
Externí odkaz:
https://doaj.org/article/b2409d2b531d4216bb4da1cb2bbac296
Publikováno v:
Future Internet, Vol 15, Iss 4, p 146 (2023)
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest
Externí odkaz:
https://doaj.org/article/f0497ab8aeba411da7fa2da2778b52ce
Publikováno v:
IEEE Access, Vol 9, Pp 68066-68080 (2021)
Several organizations are utilizing cloud technologies and resources to run a range of applications. These services help businesses save on hardware management, scalability and maintainability concerns of underlying infrastructure. Key cloud service
Externí odkaz:
https://doaj.org/article/0023f8ef5a094d7797fe258ca919f3e1
Publikováno v:
IEEE Access, Vol 9, Pp 107200-107223 (2021)
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect. With a disruption of IoT devices and applications, attackers are leveraging weak authentication and access control mechanisms on these IoT devices a
Externí odkaz:
https://doaj.org/article/ff9fa128bd304d30b59c5def6380117e
Publikováno v:
IEEE Access, Vol 9, Pp 151004-151022 (2021)
Traditionally, access control solutions have focused on how to utilize a specific type of decision parameter for access control decisions. While these “decision parameter”-focused approaches have been well accepted, they typically consider access
Externí odkaz:
https://doaj.org/article/2fce0721ec6b48dcb5f5b19197195cec
Publikováno v:
IEEE Access, Vol 8, Pp 34564-34584 (2020)
Internet of Things (IoT) and smart computing technologies have revolutionized every sphere of 21st century humans. IoT technologies and the data driven services they offer were beyond imagination just a decade ago. Now, they surround us and influence
Externí odkaz:
https://doaj.org/article/711c99926ec4405d922d7132cadaf7f3
Autor:
Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi Sandhu, Karuna Joshi
Publikováno v:
IEEE Access, Vol 8, Pp 164045-164064 (2020)
Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid advancements in technologies that support smart devices, agriculture a
Externí odkaz:
https://doaj.org/article/b635b0dec3f942b39c3b3e234a240890
Publikováno v:
Information, Vol 12, Iss 10, p 390 (2021)
The rapidly developing technology and lack of standards in the transportation industry for the proposed Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X) networks, which all vehicles will operate under, drives
Externí odkaz:
https://doaj.org/article/c282100a0c184d46b4ba42471eeddf89