2021
DOI: 10.1016/j.cose.2021.102379
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning based deep job exploration and secure transactions in virtual private cloud systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 19 publications
0
16
0
Order By: Relevance
“…Similarly, the recent works mainly identify various types of attacks and counter solutions in wireless networks [18][19][20]. Gayatri et al [21] and Kasirajan et al [22] proposed trust-based feedback routing and authentication mechanisms in wireless networks.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, the recent works mainly identify various types of attacks and counter solutions in wireless networks [18][19][20]. Gayatri et al [21] and Kasirajan et al [22] proposed trust-based feedback routing and authentication mechanisms in wireless networks.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the gender variability and age particulars, the structures and lengths of bones are dissimilar in x-ray images. [33][34][35][36] Normalization techniques are used to deal with dimensional differences of any image data points. At the same time, the data recreation is not optimal on shrunken images.…”
Section: Human Bone Fracture Detection Using ML Techniquesmentioning
confidence: 99%
“…Region detection techniques are commonly used with Sobel, Laplacian, and Gradient for ensuring an efficient edge detection quality. Due to the gender variability and age particulars, the structures and lengths of bones are dissimilar in x‐ray images 33–36 . Normalization techniques are used to deal with dimensional differences of any image data points.…”
Section: Human Bone Fracture Detection Using ML Techniquesmentioning
confidence: 99%
“…RPL is developed by IETF‐ROLL (internet engineering task force‐routing over low power and lossy networks) with feasible techniques to improve the transport layer quality. It is a proactive distance‐vector protocol 6–8 …”
Section: Introductionmentioning
confidence: 99%
“…It is a proactive distance-vector protocol. [6][7][8] A logical representation of a network is built as destination-oriented directed acyclic graphs. On the other hand, it is vulnerable to rank attacks and blackhole attacks.…”
mentioning
confidence: 99%