Simaiya S, VinayGautam UK, Lilhore (2021) AtulGarg, PinakiGhosh, Naresh Kumar Trivedi, and AbhineetAnand. “EEPSA: Energy Efficiency Priority Scheduling Algorithm for Cloud Computing.” In 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), pp. 1064–1069. IEEE,
Lilhore UK, Simaiya S, Maheshwari S, Manhar A, Kumar S (2020) Cloud performance evaluation: hybrid load balancing model based on modified particle swarm optimization and improved metaheuristic firefly algorithms. Int J Adv Sci Technol 29(5):12315–12331
Google Scholar
Torkura KA, Sukmana MIH, Cheng F, Meinel C (2020) CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure. IEEE Access 8:123044–123060. https://doi.org/10.1109/ACCESS.2020.3007338
Article
Google Scholar
Alturki R, Alyamani HJ, Ikram MA, Rahman MA, Alshehri MD, Khan F, Haleem M (2021) Sensor-Cloud Architecture: Taxonomy of Security Issues in Cloud-Assisted Sensor Networks. IEEE Access 9:89344–89359. https://doi.org/10.1109/ACCESS.2021.3088225
Article
Google Scholar
Alouffi B, Hasnain M, Alharbi A, Alosaimi W, Alyami H, Ayaz M (2021) A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access 9:57792–57807. https://doi.org/10.1109/ACCESS.2021.3073203
Article
Google Scholar
Musman S, Turner AJ (2018) A game-oriented approach to minimizing cybersecurity risk. Int J Saf Secur Eng 8(2):212–222. https://doi.org/10.2495/SAFE-V8-N2-212-222
Musman S, Turner A (2018) A game theoretic approach to cyber security risk management. J DefenseModeling Simul 15(2):127–146. https://doi.org/10.1177/1548512917699724
Article
Google Scholar
Mirsky Y, Doitshman T, Elovici Y, Shabtai A (2018) Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. pp 1308–1309. https://doi.org/10.14722/ndss.2018.23204
Parrend P, Navarro J, Guigou F, Deruyver A, Collet P (2018) Foundations and applications of artificial intelligence for zero-day and multi-step attack detection. Eurasip J Inf Secur 1:1–21. https://doi.org/10.1186/s13635-018-0074-y
Article
Google Scholar
Aparicio-Navarro FJ, Kyriakopoulos KG, Ghafir I, Lambotharan S, Chambers JA (2019) Multi-Stage Attack Detection Using Contextual Information. Proceedings - IEEE Military Communications Conference MILCOM, 2019-October, 920–925. https://doi.org/10.1109/MILCOM.2018.8599708
Sen O, Van Der Velde D, Wehrmeister KA, Hacker I, Henze M, Andres M (2021) Towards an approach to contextual detection of multi-stage cyber attacks in smart grids. SEST 2021–4th International Conference on Smart Energy Systems and Technologies. https://doi.org/10.1109/SEST50973.2021.9543359
Hu Z, Yu X, Shi J, Ye L (2021) Abnormal event correlation and detection based on network big data analysis. Computers Mater Continua 69(1):695–711. https://doi.org/10.32604/cmc.2021.017574
Al-Sawwa J, Almseidin M, Alkasassbeh M (2022) Multi-Step Cyber-Attack Dataset (MSCAD) [Data set]. Kaggle. https://doi.org/10.34740/KAGGLE/DSV/3830715
Wang X, Gong X, Yu L, Liu J (2021) MAAC: Novel Alert Correlation Method to Detect Multi-step Attack. Proceedings – 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, 726–733. https://doi.org/10.1109/TrustCom53373.2021.00106
Tang X, Wu M, Li M, Ding B (2021) On Designing the Event-Triggered Multistep Model Predictive Control for Nonlinear System Over Networks With Packet Dropouts and Cyber Attacks. IEEE Trans Cybernetics 1–13. https://doi.org/10.1109/TCYB.2021.3062056
George PG, Renjith VR (2021) Evolution of Safety and Security Risk Assessment methodologies towards the use of Bayesian Networks in Process Industries. Process Saf Environ Prot 149:758–775. https://doi.org/10.1016/j.psep.2021.03.031
Article
Google Scholar
Kabir S, Papadopoulos Y (2019) Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: A review. Saf Sci 115:154–175. https://doi.org/10.1016/j.ssci.2019.02.009
Article
Google Scholar
Benrhaiem W, Hafid AS (2020) Bayesian networks based reliable broadcast in vehicular networks. Veh Commun 21:100181. https://doi.org/10.1016/j.vehcom.2019.100181
Article
Google Scholar
Ramon J, Palacios-marqués D, Ribeiro-soriano D (2021) Using data mining techniques to explore security issues in smart living environments. Twitter Comput Commun 179(September):285–295. https://doi.org/10.1016/j.comcom.2021.08.021
Article
Google Scholar
Lilhore UK, Simaiya S, Guleria K, Prasad D (2020) An efficient load balancing method by using machine learning-based VM distribution and dynamic resource mapping. J Comput Theor Nanosci 17(6):2545–2551
Article
Google Scholar
Ghayvat H, Awais M, Gope P, Pandya S (2021) ReCognizingSUspect and PredictiNgThESpRead of Contagion Based on Mobile Phone LoCationDaTa(COUNTERACT): A system of identifying COVID-19 infectious and hazardous sites, detecting disease outbreaks based on the Internet of things, edge computing,. Sustainable Cities and Society, 69(August 2020), 102798. https://doi.org/10.1016/j.scs.2021.102798
Poongodi M, Malviya M, Kumar C, Hamdi M, Vijayakumar V, Nebhen J, Alyamani H (2022) New York City taxi trip duration prediction using MLP and XGBoost. Int J Syst Assur Eng Manage 13(1):16–27
Article
Google Scholar
Pawar N, Lilhore UK, Agrawal N (2017) A hybrid ACHBDF load balancing method for optimum resource utilization in cloud computing. Int J Sci Res Comput Sci Engineer-ing Inform Technol 3307:367–373
Google Scholar
Poongodi M, Hamdi M, Wang H (2022) Image and audio caps: automated captioning of background sounds and images using deep learning. Multimed Syst 26:1–9
Google Scholar
Poongodi M, Hamdi M, Gao J, Rauf HT (2021), December A Novel Security Mechanism of 6G for IMD using Authentication and Key Agreement Scheme. In 2021 IEEE Globecom Workshops (GC Wkshps) (pp. 1–6). IEEE
Makarius EE, Mukherjee D, Fox JD (2019) Fox AK (2020) Rising with the machines: A sociotechnical framework for bringing artificial intelligence into the organization. Journal of Business Research 120:262–273. https://doi.org/10.1016/j.jbusres.2020.07.045
Article
Google Scholar
Ramesh TR, Vijayaragavan M, Poongodi M, Hamdi M, Wang H, Bourouis S (2022) Peer-to-peer trust management in intelligent transportation system: An Aumann’s agreement theorem based approach. ICT Express
Simaiya S, Gautam V, Lilhore UK, Garg A, Ghosh P, Trivedi NK, Anand A (2021), October EEPSA: Energy Efficiency Priority Scheduling Algorithm for Cloud Computing. In 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC) (pp. 1064–1069). IEEE
Gupta I, Singh AK, Directions F (2022)IEEE Access, 10(June),71247–71277. https://doi.org/10.1109/ACCESS.2022.3188110
Article
Google Scholar
Hamdi M, Bourouis S, Rastislav K, Mohmed F (2022) Evaluation of Neuro Image for the Diagnosis of Alzhimer’s Disease Using Deep Learning Neural Network.Frontiers in Public Health,35
Ziegler V, Member S, Schneider P, Viswanathan H, Montag M, Kanugovi S, Member S, Rezaki ALI (2021) Security and Trust in the 6G Era. IEEE Access 9:142314–142327. https://doi.org/10.1109/ACCESS.2021.3120143
Article
Google Scholar
Ozgur F, Kuzlu M, Catak E, Cali U, Unal D (2022) Security concerns on machine learning solutions for 6G networks in mmWave beam prediction. Phys Communication 52:101626. https://doi.org/10.1016/j.phycom.2022.101626
Article
Google Scholar
Poongodi M, Hamdi M, Malviya M, Sharma A, Dhiman G, Vimal S (2022) Diagnosis and combating COVID-19 using wearable Oura smart ring with deep learning methods. Personal Uniquit Comput 26(1):25–35
Article
Google Scholar
Yousefnezhad N, Malhi A, Främling K (2020) Journal of Network and Computer Applications Security in product lifecycle of IoTdevices: A survey. J Netw Comput Appl 171(June):102779. https://doi.org/10.1016/j.jnca.2020.102779
Article
Google Scholar
Dalal S, Seth B, Jaglan V, Malik M, Dahiya N, Rani U, Hu YC (2022) An adaptive traffic routing approach toward load balancing and congestion control in Cloud–MANET ad hoc networks. Soft Comput 26(11):5377–5388
Article
Google Scholar
Rathore MS, Poongodi M, Saurabh P, Lilhore UK, Bourouis S, Alhakami W, Hamdi M (2022) A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography. Comput Electrical Eng 102
Clusters MCE (2021) SmartX Multi-Sec: A Visibility-Centric Multi-Tiered Security Framework for. IEEE Access 9:134208–134222. https://doi.org/10.1109/ACCESS.2021.3115523
Article
Google Scholar
Radoglou-Grammatikis P, Sarigiannidis P, Iturbe E, Rios E, Martinez S, Sarigiannidis A, Eftathopoulos G, Spyridis Y, Sesis A, Vakakis N, Tzovaras D, Kafetzakis E, Giannoulakis I, Tzifas M, Giannakoulias A, Angelopoulos M, Ramos F (2021) SPEAR SIEM: A Security Information and Event Management system for the Smart Grid. Comput Netw 193. https://doi.org/10.1016/j.comnet.2021.108008
Gupta S, Iyer S, Agarwal G, Manoharan P, Algarni AD, Aldehim G, Raahemifar K (2022) Efficient Prioritization and Processor Selection Schemes for HEFT Algorithm: A Makespan Optimizer for Task Scheduling in Cloud Environment. Electronics 11(16):2557
Article
Google Scholar
Balyan AK, Ahuja S, Lilhore UK, Sharma SK, Manoharan P, Algarni AD, Raahemifar K (2022) A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method. Sensors 22(16):5986
Article
Google Scholar
Poongodi M, Bourouis S, Ahmed AN, Vijayaragavan M, Venkatesan KGS, Alhakami W, Hamdi M (2022) A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework. Computer Communications
Fischer-hübner S, Alcaraz C, Ferreira A, Fernandez-gago C, Lopez J, Markatos E, Islami L, Akil M (2021) Journal of Information Security and Applications Stakeholder perspectives and requirements on cybersecurity in Europe. J Inform Secur Appl 61(June):102916. https://doi.org/10.1016/j.jisa.2021.102916
Article
Google Scholar
Gomez-fernandez M, Higley K, Tokuhiro A, Welter K, Wong W (2020) Status of research and development of learning-based approaches in nuclear science and engineering: A review. Nuclear Eng Design 359
Guenduez AA, Mettler T (2022) Strategically constructed narratives on artificial intelligence: What stories are told in governmental artificial intelligence policies? GovInf Q. 22
Shokry M, Ismail A, Abd-ellah MK (2022) Systematic survey of advanced metering infrastructure security:Vulnerabilities,attacks,countermeasures, and future vision. Future Generation Computer Systems 136:358–377. https://doi.org/10.1016/j.future.2022.06.013
Article
Google Scholar
Negro-calduch E, Azzopardi-muscat N, Krishnamurthy RS, Novillo-ortiz D (2021) International Journal of Medical Informatics Technological progress in electronic health record system optimization: Systematic review of systematic literature reviews. Int J Med Informatics 152:104507. https://doi.org/10.1016/j.ijmedinf.2021.104507
Article
Google Scholar
Peischl B, Tazl OA, Wotawa F (2022) The Journal of Systems & Software Testing anticipatory systems: A systematic mapping study on the state of the art. J Syst Softw 192:111387. https://doi.org/10.1016/j.jss.2022.111387
Article
Google Scholar
Rejeb A, Rejeb K, Simske S, Treiblmaier H (2022) Internet of Things The big picture on the Internet of things and the smart city: a review of what we know and what we need to know. Internet of Things 19(July):100565. https://doi.org/10.1016/j.iot.2022.100565
Article
Google Scholar
Alekseeva D, Ometov A, Arponen O, Simona E (2022) The future of computing paradigms for medical and emergency applications. Comput Sci Rev 45:100494. https://doi.org/10.1016/j.cosrev.2022.100494
Article
Google Scholar
Onyema EM, Dalal S, Romero CAT, Seth B, Young P, Wajid MA (2022) Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities. J Cloud Comput 11(1):1–20
Article
Google Scholar
Chuah SH, Yu J (2021) Journal of Retailing and Consumer Services The future of service: The power of emotion in human-robot interaction. J Retailing Consumer Serv 61(March):102551. https://doi.org/10.1016/j.jretconser.2021.102551
Article
Google Scholar
Agirre JA, Etxeberria L, Barbosa R, Basagiannis S, Giantamidis G, Bauer T (2021) Microprocessors and Microsystems The VALU3S ECSEL project: Verification and Validation of automated systems safety and security. Microprocess Microsyst 87:104349. https://doi.org/10.1016/j.micpro.2021.104349
Article
Google Scholar
Kathiravelu P, Zaiman Z, Gichoya J, Veiga L, Banerjee I (2022) Towards an internet-scale overlay network for latency-aware decentralized workflows at the edge. Comput Netw 203
Latif SA, Wen FBX, Iwendi C, Li-li FW, Mohsin SM, Han Z, Band SS (2022) AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput Commun 181:274–283
Article
Google Scholar
Ramesh TR, Lilhore UK, Poongodi M, Simaiya S, Kaur A, Hamdi M (2022) Predictive analysis of heart diseases with machinelearning approaches. Malaysian J Comput Sci 31:132–148
Google Scholar
Iwendi C et al (2020) “KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks,“. IEEE Access 8:72650–72660. doi: https://doi.org/10.1109/ACCESS.2020.2988160
Article
Google Scholar
Dhiman P, Kukreja V, Manoharan P, Kaur A, Kamruzzaman MM, Dhaou IB, Iwendi C (2022) A Novel Deep Learning Model for Detection of Severity Level of the Disease in Citrus Fruits. Electronics 11(3):495
Article
Google Scholar
Manoharan P, Walia R, Iwendi C, Ahanger TA, Suganthi ST, Kamruzzaman MM, Hamdi M (2022) SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising. Expert Syst 9
Poongodi M, Malviya M, Hamdi M, Vijayakumar V, Mohammed MA, Rauf HT, Al-Dhlan KA (2022) 5G based Blockchain network for authentic and ethical keyword search engine. IET Commun 16(5):442–448
Article
Google Scholar