Cyspace Labs

Cyspace Labs
2 min read

A COMBINATION OF OPTIMIZATION-BASED MACHINE LEARNING AND BLOCKCHAIN MODEL FOR ENHANCING SECURITY AND PRIVACY IN THE MEDICAL SYS-TEM

The intellectual team of IJMRA comprises of professionals across the world serving this academy in

various positions as Chief Advisors, Technical Advisors, International Editorial Board, Editorial Advisory

Board, Associate Editors, Reviewers, Conference Organizers etc..

Cyspace Labs
 

Reference

1. Chandra, Ajay. International Journals of Multidisciplinary Research. IJMRA. [Online] March 01, 2024.

[Cited: March 01, 2024.] https://www.ijmra.us/2024ijesr_march.php.

A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD NEURAL NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT

IJMRA is set up on a very strong scientific foundation and is one of the leading open-access, on-line journals in the World. This Academy boasts of hosting five major international journals under its wings, namely:

 

Reference

Dr. K Soumya, D. B. (2024, April). HANDWRITTEN TEXT RECOGNITION USING

PYTESSERACT. (IJMRA) Retrieved from IJMRA:

https://www.ijmra.us/2024ijmie_april.php

 

MK, A. C. (2024, April). A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD

NEURAL NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT. Retrieved

from IJMRA: https://www.ijmra.us/2024ijmie_april.php

 

Panwar, V. (2024, April). Balancing Innovation and Transparency. (IJMRA )

Retrieved from A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD NEURAL

NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT:

https://www.ijmra.us/2024ijmie_april.php

 

Fortifying Patient Privacy: A Cloud-Based IoT Data Security Architecture in Healthcare

Concerns regarding patient privacy and security have been raised by the explosion in data

generated by the growing use of IoT devices in healthcare settings. The absence of strong

processes for authenticating individuals.

 

Reference

( MK, A. C. (2024, April). Fortifying Patient Privacy: A Cloud-Based IoT Data Security Architecture in Healthcare. Retrieved from International Journal of Research in IT and Management (IJRIM: https://euroasiapub.org/wp-content/uploads/IJRIM2April24-A-CM.pdf

 

The procedure of identifying and reacting to unauthorized or malicious behaviours

within the IOT system, is called IOT attack detection. There are some several advantages and

challenges associated with implementing and maintaining the detection systems. Some of the

limitations are Complexity, false positive and negative and scalability. To defeat these

restrictions, we suggested a deep-learning based classification model (INTE).

 

Reference

MK, A. C. (2024, April). Association of Academic Researchers and Faculties (AARF) . Retrieved

from International Research Journal of Mathematics, Engineering and IT:

https://www.aarf.asia/current/2024/Apr/jzi4t181CRRyU43.pdf

In case you have found a mistake in the text, please send a message to the author by selecting the mistake and pressing Ctrl-Enter.
Cyspace Labs 2
Joined: 2 weeks ago
Comments (0)

    No comments yet

You must be logged in to comment.

Sign In / Sign Up