The role of 5G-IoT has become indispensable in smart applications and it plays a crucial part in e-health applications. E-health applications require intelligent schemes and architectures to overcome the security threats against the sensitive data of patients. The information in e-healthcare applications is stored in the cloud which is vulnerable to security attacks. However, with deep learning techniques, these attacks can be detected, which needs hybrid models. In this article, a new deep learning model (CNN-DMA) is proposed to detect malware attacks based on a classifier—Convolution Neural Network (CNN). The model uses three layers, i.e., Dense, Dropout, and Flatten. Batch sizes of 64, 20 epoch, and 25 classes are used to train the netwo...
The Internet of Things (IoT) is prone to malware assaults due to its simple installation and autonom...
IoT is widely used in many fields, and with the expansion of the network and increment of devices, t...
With the rapid increase in the amount and type of malware, traditional methods of malware detection ...
Cyber-attacks on the numerous parts of today’s fast developing IoT are only going to increase in fre...
5 G is becoming the foundation for the Industrial Internet of Things (IIoT) enabling more effective ...
Malicious attacks to software applications are on the rise as more people use Internet of things (Io...
The Internet of Things (IoT), considered an intriguing technology with substantial potential for tac...
Recent technological developments in computer systems transfer human life from real to virtual envir...
5 G is becoming the foundation for the Industrial Internet of Things (IIoT) enabling more effective ...
5G is becoming the foundation for the Industrial Internet of Things (IIoT) enabling more effective l...
Due to their low power consumption and computing power, Internet of Things (IoT) devices are difficu...
The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm...
Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital...
In recent years, deep learning has emerged as a powerful tool for image classification tasks. Howeve...
The mobile device has become an integrated part of everyone's life. The mobile users store their sen...
The Internet of Things (IoT) is prone to malware assaults due to its simple installation and autonom...
IoT is widely used in many fields, and with the expansion of the network and increment of devices, t...
With the rapid increase in the amount and type of malware, traditional methods of malware detection ...
Cyber-attacks on the numerous parts of today’s fast developing IoT are only going to increase in fre...
5 G is becoming the foundation for the Industrial Internet of Things (IIoT) enabling more effective ...
Malicious attacks to software applications are on the rise as more people use Internet of things (Io...
The Internet of Things (IoT), considered an intriguing technology with substantial potential for tac...
Recent technological developments in computer systems transfer human life from real to virtual envir...
5 G is becoming the foundation for the Industrial Internet of Things (IIoT) enabling more effective ...
5G is becoming the foundation for the Industrial Internet of Things (IIoT) enabling more effective l...
Due to their low power consumption and computing power, Internet of Things (IoT) devices are difficu...
The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm...
Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital...
In recent years, deep learning has emerged as a powerful tool for image classification tasks. Howeve...
The mobile device has become an integrated part of everyone's life. The mobile users store their sen...
The Internet of Things (IoT) is prone to malware assaults due to its simple installation and autonom...
IoT is widely used in many fields, and with the expansion of the network and increment of devices, t...
With the rapid increase in the amount and type of malware, traditional methods of malware detection ...