The Message Queuing Telemetry Transport (MQTT) protocol stands out as one of the foremost and widely recognized messaging protocols in the field. It is often used to transfer and manage data between devices and is extensively employed for applications ranging from smart homes and industrial automation to healthcare and transportation systems. However, it lacks built-in security features, thereby making it vulnerable to many types of attacks such as man-in-the-middle (MitM), buffer overflow, pre-shared key, brute force authentication, malformed data, distributed denial-of-service (DDoS) attacks, and MQTT publish flood attacks.
View Article and Find Full Text PDFIn this manuscript micro aneurysm detection using residual-based temporal attention Convolutional Neural Network (CNN) with Inception-V3 transfer learning optimized with equilibrium optimization algorithm (MA-RTCNN-Inception V3-EOA) is proposed. The proposed research work contains four phases: (1) pre-processing, (2) segmentation, (3) post-processing, and (4) classification. At first, guided box filtering for contrast enhancement and background exclusion of input image.
View Article and Find Full Text PDFThe internet of things (IoT) technology presents an intelligent way to improve our lives and contributes to many fields such as industry, communications, agriculture, etc. Unfortunately, IoT networks are exposed to many attacks that may destroy the entire network and consume network resources. This paper aims to propose intelligent process automation and an auto-configured intelligent automation detection model (IADM) to detect and prevent malicious network traffic and behaviors/events at distributed multi-access edge computing in an IoT-based smart city.
View Article and Find Full Text PDFThe goal of this paper is to classify the various cough and breath sounds of COVID-19 artefacts in the signals from dynamic real-life environments. The main reason for choosing cough and breath sounds than other common symptoms to detect COVID-19 patients from the comfort of their homes, so that they do not overload the Medicare system and therefore do not unwittingly spread the disease by regularly monitoring themselves. The presented model includes two main phases.
View Article and Find Full Text PDF