Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Raja Kumar Murugesan"'
Autor:
Poornima Mahadevappa, Raja Kumar Murugesan, Redhwan Al-amri, Reema Thabit, Abdullah Hussein Al-Ghushami, Gamal Alkawsi
Publikováno v:
MethodsX, Vol 12, Iss , Pp 102597- (2024)
The article presents a secure edge computing model that utilizes machine learning for intrusion detection and isolation. It addresses the security challenges arising from the rapid expansion of IoT and edge computing. The proposed Intrusion Detection
Externí odkaz:
https://doaj.org/article/51fd65cbc1cf4047b2bacf01320d69da
Autor:
Sobia Wassan, Hu Dongyan, Beenish Suhail, N.Z. Jhanjhi, Guanghua Xiao, Suhail Ahmed, Raja Kumar Murugesan
Publikováno v:
Digital Health, Vol 10 (2024)
Background Deep Learning is an AI technology that trains computers to analyze data in an approach similar to the human brain. Deep learning algorithms can find complex patterns in images, text, audio, and other data types to provide accurate predicti
Externí odkaz:
https://doaj.org/article/11ac0c40ac0940ed8570530d84cd3edf
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 6, Pp 2831-2839 (2022)
An influencer is an impactful content creator on social media. The emergence of influencers led to increased influencer marketing. The task of picking the right influencers is widely studied through influence maximization (IM). Existing IM studies ha
Externí odkaz:
https://doaj.org/article/7d38672a3ef64b4ab031ce9e613e8108
Publikováno v:
Engineering and Applied Science Research, Vol 48, Iss 2, Pp 221-229 (2021)
Influencing customers through social media is a new form of marketing. Recently, there were studies on the Influence Maximization (IM) problem, which aimed to identify influencers that can spread influence to a wider audience. The complex social medi
Externí odkaz:
https://doaj.org/article/6c19eb65740944b9af53a55f6f65d11c
Autor:
Rafia Afzal, Raja Kumar Murugesan
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 1 (2022)
In the 1970s, roaming interconnections for cellular networks were designed for a few trusted parties. Hence, security was not a major concern. Today, the SS7 (Signaling System no. 7) solution that is several decades old is still used for many roaming
Externí odkaz:
https://doaj.org/article/753c5fadf7c5401fa83ed70d5352645a
Publikováno v:
ICT Express, Vol 6, Iss 3, Pp 243-248 (2020)
In this research, a new Instagram popularity metric was defined, i.e. outsiders percentage (OP) of a post. Outsiders are non-followers who liked a user’s post. It was found that OP is the most effective metric if compared to engagement rate and fol
Externí odkaz:
https://doaj.org/article/936e1b329c3b429aae974e615f31f87b
Autor:
Syeda Mariam Muzammal, Raja Kumar Murugesan, Noor Zaman Jhanjhi, Mamoona Humayun, Ashraf Osman Ibrahim, Abdelzahir Abdelmaboud
Publikováno v:
Sensors, Vol 22, Iss 18, p 7052 (2022)
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. T
Externí odkaz:
https://doaj.org/article/2420c51c31bc42129aae91e4cc603897
Autor:
Syeda Mariam Muzammal, Raja Kumar Murugesan, NZ Jhanjhi, M. Shamim Hossain, Abdulsalam Yassine
Publikováno v:
Sensors, Vol 22, Iss 16, p 6215 (2022)
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and features. Among various RPL security solutions, a trust-based security
Externí odkaz:
https://doaj.org/article/b1b419a140bf4bd98226c72001aaf468
Autor:
Redhwan Al-amri, Raja Kumar Murugesan, Mubarak Almutairi, Kashif Munir, Gamal Alkawsi, Yahia Baashar
Publikováno v:
Applied Sciences, Vol 12, Iss 13, p 6523 (2022)
As applications generate massive amounts of data streams, the requirement for ways to analyze and cluster this data has become a critical field of research for knowledge discovery. Data stream clustering’s primary objective and goal are to acquire
Externí odkaz:
https://doaj.org/article/83f1cfd01db84d49839aed2f6dfcd6d5
Autor:
SUPRIYANTO PRAPTODIYONO, TEGUH FIRMANSYAH, IZNAN H. HASBULLAH, RAJA KUMAR MURUGESAN, AZLAN OSMAN, CHONG YUNG WEY
Publikováno v:
Journal of Engineering Science and Technology, Vol 13, Iss 9, Pp 2898-2915 (2018)
Neighbour Discovery Protocol is a core IPv6 protocol used within the local network to provide functionalities such as Router Discovery and Neighbour Discovery. However, the standard of the protocol does not specify any security mechanism but only rec
Externí odkaz:
https://doaj.org/article/eab15c2679074ebd8eda5fe9e428c745