The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
KK Approach to Increase Resilience in Internet of Things: A T-Cell Security Concept
Abstract
This technique for identifying malicious nodes is known by the inventor as the “KK approach.” We compare the throughput and delay of the system with the proposed KK Approach, and the results are superior compared to the earlier techniques. Its abilities to learn, adapt, collaborate, and act independently make it a potent weapon in fighting against cyber threats. It is also capable of learning. However, additional research and development are required to overcome the limitations and challenges associated with its deployment. It is essential to continue investigating and financing state-of-the-art solutions in order to guarantee the security and privacy of these networks. This is because we rely more and more on gadgets connected to the IoT for our everyday needs.
Related Content
Dina Darwish.
© 2025.
14 pages.
|
P. Selvakumar.
© 2025.
24 pages.
|
P. Selvakumar, S. Geetha, N. Kaya, Pankaj Singh Chandel, Prateek Srivastava.
© 2025.
24 pages.
|
Muhammad Younus, Achmad Nurmandi, Dyah Mutiarin, Andi Luhur Prianto, Halimah Abdul Manaf, Ririn Harini, Muntahanah Muntahanah, Sri Ekowati, Titi Darmi, Wulan Angraini.
© 2025.
24 pages.
|
Kutubuddin Sayyad Liyakat Kazi.
© 2025.
34 pages.
|
Ankita Chaturvedi, Neha Yadav, M. Gnanendra, A. V. Senthil Kumar.
© 2025.
22 pages.
|
Mihrali Köseliören, Bünyamin Ayhan.
© 2025.
18 pages.
|
|
|