-
Article
Security assessment of operating system by using decision making algorithms
Decision-making is the most important phenomenon of selectivity in the given set of factors. Operating System (OS) security is profoundly reliant upon different factors, affecting the security of OS. The OS se...
-
Chapter and Conference Paper
Data Mining: An Incipient Approach to World Security
With the gradation of time, the world has witnessed major advancements in the field of Information Technology (IT), resulting in massive data generation. The increased use of social media and new inventions ha...
-
Chapter and Conference Paper
Security in IoT Layers: Emerging Challenges with Countermeasures
In a short timeframe, Internet of Things (IoT) has gained a lot of traction and has entrenched itself as a global technology. IoT devices are typically integrated with machine learning and artificial intellige...
-
Chapter and Conference Paper
A Step Towards Smart Farming: Unified Role of AI and IoT
The Internet of Things (IoT) could be compared with electricity in the modern era. Over the past ten years, it has revolutionised modern society on a daily basis through a variety of applications in several cr...