2022
DOI: 10.3390/app12125893
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Machine Learning Based Privacy Preserving Blockchain Assisted Internet of Things with Smart Cities Environment

Abstract: Currently, the amount of Internet of Things (IoT) applications is enhanced for processing, analyzing, and managing the created big data from the smart city. Certain other applications of smart cities were location-based services, transportation management, and urban design, amongst others. There are several challenges under these applications containing privacy, data security, mining, and visualization. The blockchain-assisted IoT application (BIoT) is offering new urban computing to secure smart cities. The b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 48 publications
(22 citation statements)
references
References 23 publications
0
22
0
Order By: Relevance
“…In general, malicious URLs can be identified with the help of Machine Learning (ML) technique through two steps as detailed herewith. At first, a suitable feature indication is obtained from the URL, and secondly, based on the feature identified, ML-related prediction methods are provided training to find out the malicious URLs [7,8]. The first step discussed above i.e., attaining the feature indication in which fruitful information regarding the URL is saved in a vector so that the ML methods can be implied to it.…”
Section: Introductionmentioning
confidence: 99%
“…In general, malicious URLs can be identified with the help of Machine Learning (ML) technique through two steps as detailed herewith. At first, a suitable feature indication is obtained from the URL, and secondly, based on the feature identified, ML-related prediction methods are provided training to find out the malicious URLs [7,8]. The first step discussed above i.e., attaining the feature indication in which fruitful information regarding the URL is saved in a vector so that the ML methods can be implied to it.…”
Section: Introductionmentioning
confidence: 99%
“…By utilizing IoT technology, Cardiovascular Disease (CVD) monitoring system can collect and transfer the physical variables of a patient to a distant healthcare facility center on real-time basis. In human body, heart is one of the highly significant organs [7] while CVD specifically affects the heart's functioning. In clinical research, CVD diagnosis is a main and difficult problem to overcome.…”
Section: Introductionmentioning
confidence: 99%
“…These characteristics limit the predominant application of probable security solutions. When finding malware attacks in IoT environment, three predominant problems are faced [6]. Fig.…”
Section: Introductionmentioning
confidence: 99%