2022
DOI: 10.1007/978-3-031-13150-9_5
|View full text |Cite
|
Sign up to set email alerts
|

Mirai Botnet Attacks on IoT Applications: Challenges and Controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 39 publications
0
0
0
Order By: Relevance
“…This hybrid optimization model is computationally efficient, can able to learn quickly and making it suitable for large scale real-time applications called smart healthcare applications. This makes it an ideal choice for a range of applications, from predictive modeling to data classification and the equations (6,7,16) for selection, crossover, mutation, and fitness functions in data preprocessing on CXR images. And this hybrid optimization model is cost-effective, making it viable option for large-scale smart healthcare applications, and it will produce consistent results.…”
Section: Hgwo-pso Based Preprocessingmentioning
confidence: 99%
See 1 more Smart Citation
“…This hybrid optimization model is computationally efficient, can able to learn quickly and making it suitable for large scale real-time applications called smart healthcare applications. This makes it an ideal choice for a range of applications, from predictive modeling to data classification and the equations (6,7,16) for selection, crossover, mutation, and fitness functions in data preprocessing on CXR images. And this hybrid optimization model is cost-effective, making it viable option for large-scale smart healthcare applications, and it will produce consistent results.…”
Section: Hgwo-pso Based Preprocessingmentioning
confidence: 99%
“…Using the private key, the decryption procedure transforms the data that was encrypted using the cipher into the original image. The decryption process is essentially the same as the encryption process; however, it applies the steps in the opposite order [7]. When it comes to encryption, the function of the secret keys is of the utmost importance.…”
Section: Introductionmentioning
confidence: 99%