Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Fog Forensics: A Comprehensive Review of Forensic Models for Fog Computing Environment

    Numerous potential social advantages are offered by fog computing, including personalized healthcare, smart cities, agri technology, automated transportation, consumer IoT, and many more. Ambient computing at ...

    Konrad Śniatała, Yashas Hariprasad in Information Security, Privacy and Digital … (2024)

  2. No Access

    Chapter and Conference Paper

    Cyber Security Attack Detection Framework for DODAG Control Message Flooding in an IoT Network

    Advancement in the IoT technologies and the futuristic device’s usage influences the human life in all the aspects of day-to-day activities. Moreover, human reliance on smart objects makes IoT an important too...

    Jerry Miller, Lawrence Egharevba in Information Security, Privacy and Digital … (2024)

  3. No Access

    Chapter and Conference Paper

    AI-ML Analytics: A Comprehensive Investigation on Sentimental Analysis for Social Media Forensics Textual Data

    Individuals spend a significant portion of their time on social media. It has become a platform for expression of feelings, sharing of ideas and connecting with other individuals using video and audio posts, t...

    Yashas Hariprasad, Suraj Lokesh, Nagarjun Tumkur Sharathkumar in Intelligent Computing (2023)

  4. No Access

    Chapter and Conference Paper

    Boundary-Based Fake Face Anomaly Detection in Videos Using Recurrent Neural Networks

    With the surge in the videos over the internet and the spread of digital communications, the attackers are greatly benefited by creating and publishing the fake distorted videos and images known as Deepfakes. ...

    Yashas Hariprasad, K. J. Latesh Kumar, L. Suraj in Intelligent Systems and Applications (2023)

  5. No Access

    Chapter

    AI Powered Correlation Technique to Detect Virtual Machine Attacks in Private Cloud Environment

    The efficacy of cyber forensic systems primarily depends on the real-time discovery and the analysis of the threats in a timely manner. This process requires the development of smart techniques with good prece...

    K. J. Latesh Kumar, Yashas Hariprasad in AI Embedded Assurance for Cyber Systems (2023)