Skip to main content

and
  1. No Access

    Article

    Security assessment of operating system by using decision making algorithms

    Decision-making is the most important phenomenon of selectivity in the given set of factors. Operating System (OS) security is profoundly reliant upon different factors, affecting the security of OS. The OS se...

    Prabhash Chandra Pathak, Mohd Nadeem in International Journal of Information Techn… (2024)

  2. No Access

    Chapter and Conference Paper

    Data Mining: An Incipient Approach to World Security

    With the gradation of time, the world has witnessed major advancements in the field of Information Technology (IT), resulting in massive data generation. The increased use of social media and new inventions ha...

    Syed Anas Ansar, Swati Arya, Sujit Kumar Dwivedi in Computer Vision and Robotics (2023)

  3. No Access

    Chapter and Conference Paper

    Security in IoT Layers: Emerging Challenges with Countermeasures

    In a short timeframe, Internet of Things (IoT) has gained a lot of traction and has entrenched itself as a global technology. IoT devices are typically integrated with machine learning and artificial intellige...

    Syed Anas Ansar, Swati Arya, Shruti Aggrawal in Computer Vision and Robotics (2023)

  4. No Access

    Chapter and Conference Paper

    A Step Towards Smart Farming: Unified Role of AI and IoT

    The Internet of Things (IoT) could be compared with electricity in the modern era. Over the past ten years, it has revolutionised modern society on a daily basis through a variety of applications in several cr...

    Syed Anas Ansar, Kriti Jaiswal, Prabhash Chandra Pathak in Computer Vision and Robotics (2023)