332-364 Redc 2024
332-364 Redc 2024
332-364 Redc 2024
Abstract
Page | 332
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
1.0 Introduction
Edge computing is the next generation of data processing and analytics, where computational
tasks are offloaded from traditional cloud paradigms to the edge (edge devices on-premise)
purely due to performance reasons. This paradigm confers many benefits such as lowering
latencies, improving real-time processing abilities, and requiring less bandwidth. Edge
computing helps analyze huge volumes of data being generated by IoT devices, sensors, or other
connected systems at the point of origin itself and in real-time. Yet it also brings a different set of
cybersecurity threats due to the inherent decentralization of edge computing, which will require
new security models and strategies. As edge computing comes into its own, the potential security
threats are also becoming a labyrinth of complexity and diversity. Where traditional
cybersecurity measures were designed with centralized clouds in mind, they also tend to break or
fail short when attempting at the unique security issue faced by edge environments. Some
vulnerabilities come with scale, such as a larger attack surface from greater numbers or
remoteness of deployment (IoT devices in the field), risk due to physical access by unauthorized
parties, and varied security postures on heterogeneous device types. As a result, securing the data
on the edge is becoming more and more crucial for organizations considering deploying in
production with an edge computing solution. One potential transformational technology to help
in meeting these cybersecurity challenges is machine learning (ML), which provides advanced
capabilities for threat detection, anomaly identification, and adaptive response. Supervised
Learning, and Unsupervised Learnings These ML algorithms have incredible potential to be used
in security where data can be processed and real-time analysis could provide an automated
decision. For example, anomaly detection can help to identify any variations from typical
behavior patterns which could represent either an intrusion attempt or malicious activity
undetected by traditional rule-based systems and behavioral analysis models will enhance this
where more advanced threat trends continue learning and adapting the capability of intruding
even more sophisticated attacks templates. Adding ML to edge computing ecosystems introduces
its share of complexities. However, ML models when deployed at scale using traditional
methods struggle with resource constraints (limited compute power and storage capacity on edge
Page | 333
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
devices) which makes the deployment process challenging. Furthermore, guaranteeing the
robustness of ML algorithms in heterogeneous and fast-evolving edge contexts demands
solutions to data quality transition drifts, model overfitting limitations as well as real-time
processing constraints. This paper examines these challenges and assesses how different ML
methods are useful in fortifying the edge against cyber threats. Through a systematic
reassessment of current methodologies and empirical case studies, the proposed review would
deliver insights to outline what is possible with ML-driven solutions towards strengthening
security for edge computing frameworks (what has already been accomplished) as it uncovers
new areas that warrant more research & development.
To summarize, as edge computing grows in popularity and size the inclusion of machine learning
could be a powerful new method to lock down cyber defenses. The very fact that ML is so good
at dynamically learning and keeping up with new threats makes it a crucial part of modern
enterprise cybersecurity. Through this paper we aim to add to the ongoing debate around
securing edge computing using ML, giving a thorough inspection of existing solutions and how
effective are they all too along with challenges that need more attention for establishing strong
caveats at the edge.
The field of edge computing for cybersecurity has been an active area of research that also looks
at how machine learning (ML) can improve security measures in this context. The initial studies
have outlined different ML techniques, that provide edge computing that advantages and
limitations. For instance, Zhang et al. (2019) conducted a comprehensive review on edge
computing and machine learning with an emphasis on anomaly detection applications for
intrusion prevention. They focused on how unsupervised learning algorithms, e.g., clustering and
dimensionality reduction methods can be used to detect anomalous patterns that might signify
attacks. However, they also mentioned that while these methods allow insight into the behavior
of a model, their effectiveness is frequently hampered by the quality and quantity of training data
Page | 334
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
present at an edge (Zhang et al. 2019). Meanwhile, Liu and Wang (2020) investigated the
incorporation of neural networks into supervised learning solutions for real-time security event
detection at edge sides. Their research highlighted that deep learning models, like Convolutional
Neural Networks (CNNs) and Long Short-Term Memory (LSTM), can improve the accuracy of
intrusion detection systems (IDS) by studying intricate patterns in network traffic data. A
significant enhancement in detection rates relative to common signature-based methods that
generally do not identify novel or polymorphic hazards was reported (Liu & Wang, 2020).
However, they mentioned that deploying such deep learning models on edge devices, which are
resource-constrained than the cloud servers and hence handling high computation is a challenge
again comes to careful selection of the model complexity, and computational requirements.
These advancements in addition to it were also discussed by Chen et al. (2021), who performed
an investigation into the possibility of applying reinforcement learning (RL) for edge adaptive
cybersecurity. Their work reveals the capability of RL algorithms to adapt security policies
according to near-live threat evaluation and increased attack modes. Chen et al. introduced a
variety of techniques, i.e., Q-learning and policy gradient methods. found that RL may enhance
security systems through the adaptability and responsiveness of traditional rule-based strategies
but can not provide such capabilities due to their static nature (Chen et al., 2021). During our
evaluation, we found that formal verification might not scale well to the complexity of some RL
algorithms or use cases as they often need large-scale training and computational resources
which could be hard to facilitate within decentralized edge environments.
In the meantime, there has been a renewed interest in using hybrid approaches combining non-
ML and ML techniques to solve difficult problems regarding security for edge computing. For
instance, Smith & Brown (2022) introduced a solution combining anomaly detection along with
behavioral analysis and ensemble learning to improve the accuracy of threat detection. Their
model outperformed single-technique approaches in multiple benchmark tests and showed better
results than the existing systems at recognizing known as well as new threats. The reason why it
did so well was because the model could take advantage of a bunch of different ML models that
were good at things A or B and use those to mitigate weaknesses in other ones (Smith & Brown,
Page | 335
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
2022). This is consistent with what the work of Zhang et al suggested. (2023)), which promoted
the multi-faceted edge security framework to aggregate various ML tactics for holistic
protection. While these advancements have been considerable, the challenges of deploying ML
models for security in edge computing environments remain. Data privacy, model scalability &
computational overhead are a few of the challenges that limit their broader applications. For
instance, Johnson et al. On the other hand, (2024) faced evaluating tradeoffs between model
complexity and efficiency as they presented lightweight yet high-capacity models that allowed
decent inference time constraints at an edge device. Their findings identify several strategies that
might be pursued to make it more efficient as we discuss in the following example: Model-
centric approaches based on pruning, quantization, or federated learning of ML models are some
practical solutions (Johnson et al., 2024). There is so much literature on ML and cybersecurity in
edge computing that suggests the high potential of machine learning for improved edge security.
The feedback and tracking loops necessary for proper remediation often face significant
limitations due to lack of capacity, connectivity, and operational challenges, forcing reliance on
ML techniques like anomaly detection (which has its own set of trade-offs), deep learning, or
reinforcement learning. Moving forward, this can be potentially addressed via hybrid models and
optimization strategies to increase the efficacy of ML-based security solutions. Looking at the
future, there are more innovative ways other than securing each device and those retain some
drawbacks as well; thus in consequence not fulfill requirements of either robustness or
scalability. Accordingly, the recent research contributes to a robust conceptual understanding of
implementing ML for securing edge computing environments focusing on innovative
methodologies and real-life use cases. Xu et al inject some interesting Although the work most
closely related to this study is [14], 2022, which used ensemble computed methods for enhancing
intrusion detection in edge networks. The method of this study was to use decision trees, support
vector machines (SVMs), and k-nearest neighbors (k-NN) as classifiers that can be combined for
detection enhancement to occur. This ensemble approach converged faster in terms of false
positives and negatives compared to individual classifiers, which suggests the efficacy of this
methodology for handling diversity and dynamics (of edge network). This approach combines
Page | 336
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
the advantages of different classifiers and alleviates their disadvantages, which is particularly
important for the challenging security requirements in edge computing (Xu et al., 2022). Their
research also highlighted the necessity of a real-time adaptable solution since their ensemble
models were dynamic and can be adjusted to meet new threats in real-time — All crucial
elements for deploying edge computing security sustainably. One of the most important studies
has been done by Patel and Kumar (2023) who discussed incorporating federated learning with
ML models for privacy-preserving edge computing under data heterogeneity. Consequently,
federated learning allows for model training to occur collectively among many on-edge devices
without the need for them to submit sensitive data en masse resulting in improved privacy and
security. Through their work, Patel and Kumar showcased how federated learning could enhance
security models across the board by averaging learnings from various edge nodes while
safeguarding personal data. Patel and Kumar (2023) showed that federated learning models are
competitive with centralized models in terms of both accuracy and generalization, despite the
difficulties associated with data fragmentation non-i.i.d.(independently identically
distributed)data. Such an approach solves the issues with data protection and compliance, which
makes this a strong option to handle the security of edge environments while still complying
with different legislations. These results highlight the changing face of ML applications in edge
computing security, showing just how far these methods can go — and yet also indicative of
what stands to be gained through incorporating such cutting-edge developments. By integrating
ensemble learning and federated learning, we have made great progress in developing more
efficient as well as privacy-preserving security solutions. Yet further development is needed to
fine-tune these methods and deal with the tighter practical limitations faced by edge
environments in industry.
3.0 Methodology
This study aims to evaluate the effectiveness of machine learning (ML) techniques in enhancing
cybersecurity within edge computing environments. We adopt a comprehensive methodology
Page | 337
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
that integrates theoretical model development with empirical analysis. The research framework is
structured into several key phases: data collection, model development, evaluation, and
validation.
The data used in this research originated from both simulated and real-world datasets that mimic
the edge computing environment. We generated simulated data in a custom edge network
simulation environment replicating the natural behavior of the average network user generating
legitimate (both benign and vulnerable) traffic on those shadowed components. To acquire real
data, public state-of-the-art cybersecurity datasets namely NSL-KDD (Cafarella et al., 2018) and
UNSW-NB15(Moustafa et al.; Moustafa & Slay; Mosolova; Ben-Eleka, 2015), are used to
furnish the diversity of typical types of network traffic along with respective intrusion.
All datasets were given careful preprocessing steps to ensure the data quality and relevance. This
included procedures like data cleaning to deal with noise and normalization so that features exist
at the same scale, as well as feature extraction where we derived useful attributes from raw data.
Once the clusters were created, different algorithms, like LOF or DBSCAN. and some domain
knowledge allowed for labeling anomalous patterns that trained a supervised learning model in
training. For unsupervised learning, we used statistical techniques to find anomalies and labeled
them based on deviation from standard traffic.
Page | 338
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
For data collection, a combination of simulated datasets and real-world datasets are employed to
facilitate rigorous testing of the ML algorithms concerning securing edge computing [30].
Source ContentThree primary datasets were included.
Generated with custom-built edge network simulations using our own time-triggered FPGA
code. The entire testing is based on this platform that simulates real-life network traffic patterns
and security incidents, in a controlled environment.
Real-World Dataes: Acquired from well-known databases like the NSL-KDD dataset (Cafarella
et al., 2018), and UNSW-NB15 dataset(GameObject null, 2 adventure element) These comprise
different network traffic traces as well as intrusion annotations.
We use paired t-tests to test significant differences in overall temporal and spatial conditions
between models. Where t is the paired sample T-statistic.
Vowel Measurements The VowCor capacity measure is the t-value, of pronunciation space
distance (d-bars) on a scale determined by sd√n where n is equal to number_tests.
4.0 Results
Table 1 summarizes the results of this study The key metrics (accuracy, precision, recall, f1-
score, and AUC-ROC) determine the performance of each ML model.
Page | 339
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
Random Forest
Decision Trees
One-Class SVM
Isolation Forest
Accuracy (%) FN TN FP TP
The Convolutional Neural Network (CNN) performed better than other models with an accuracy
of 92.1%, a precision of 90.0%, a recall of 94.3%, and F-score: ***AUC-ROC***. That is,
CNNs excel in learning sophisticated structures and deviations from the normal in network
traffic data — properties that are highly relevant for edge-based IDS. Another best performer
was the Random Forest model, with an accuracy of 91.0% and AUC-ROC at a high level
meaning almost perfect stay still probably meaningful that not ideal privacy properties can be
Page | 340
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
both natural language processed as well on multi-class fashion training sets l. Due to its stability
and success with high-dimensional feature spaces, this method is a strong choice for edge
computing environments. Summary: Compared to CNNs, LSTM networks, and Gradient
Boosting Machines performed very similarly (with a small amount of decreasing accuracy or
AUC-ROC scores) although still highly effective. Certain unsupervised anomaly detection
models such as Isolation Forest and One-Class SVM were run, but they produced low
performance metrics when compared to supervised approaches or DL techniques. While it is
great for anomaly detection, it may not be able to pick up on the full scope as efficiently
compared to more complicated models.
Tables and formulas hereby show the results and analysis of each model's performance.
Page | 341
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
600
500
400
300
200
100
0
TP FP TN FN Accuracy (%)
Positive 550 50
Negative 40 560
We also include confusion matrices for both models and detailed performance calculations to
further investigate model performance. This data is built for Excel and graphing/ visualizing the
data.
Page | 342
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
Page | 343
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
The tables and formulas that are present provide a more complete view of the performance of
these models. If we compare different methods using this evaluation criterion, the highest
average value indicates that the CNN model is most effective in the detection and classification
of cybersecurity threats in an edge computing environment. The Random Forest model also
performed very well in the accuracy and AUC-ROC, so it seems to be a good option for real
purposes where computational resources might be scarce.
5.0 Discussion
The study results can offer a full evaluation of machine learning (ML) models in terms of
cybersecurity for edge computing environments. The analyses collectively reveal large variations
in performance between models, indicating further which types of actors each method is better or
worse at detecting and mitigating.
Page | 344
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
The CNN had the best performance with an accuracy of 92.1%, precision (93.3%), recall
(94.3%) F(1) and AUC-ROC0scores were 93,8%and,0.,95respectively Such impressive results
demonstrate the ability of CNNs to effectively model intricate, network-level temporal causality
inherent in high-dimensional data and outliers—a necessary element for handling sophisticated
threat detection at runtime within edge environments. Comparison of ROC curve between
CNN:12L with previous modelsThe result in Fig 4 indicated the high value of AUC-ROC which
also means that CIAN can separate malicious activity from benign one efficiently, thus making
less false positive and negative. In contrast, the Random Forest model showed better results with
an accuracy of 91.0% and AUC-ROC of 0.94 as well. Decision Trees like Random Forests are
powerful in terms of handling mixed feature spaces and able to manage several such features
which makes them an ideal candidate for Edge Computing environments where computational
resources are more towards the limited side than compared to high-end servers. Although its
relatively low performance as compared to CNNs still suggests that it can be a powerful way to
supply reliable security.
2. Comparative Analysis
Page | 345
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
models to characterize normal and anomalous behavior better. Conversely, unsupervised models
that do not need labeled data might find it difficult to differentiate different threat types
accurately due to the complexity and result in lower performance metrics.
Deep learning models (mainly CNNs) achieved the best performance metrics. CNNs gained the
best accuracy reported (92.1%), and also surpassed in precision 93.3%, recall 94.3%, F1-score
93.8%, and AUC-ROC:0,95) due to their capability of learning hierarchical feature
representations that capture sparse patterns embedded within a large dataset like images [24].
These results demonstrate the capability of CNNs to robustly capture and handle complex, time-
dependent network traffic data effectively for real-time cybersecurity use cases. LSTMs are also
promising models, albeit slightly less performant than CNNs. LSTMs containing the network
sequence showed that they were successful at capturing longitudinal patterns in data with an
accuracy of 91.8%, precision: of 92.1%, recall:93.7% I F1 score (harmonic mean for precision
and recall):92,9 % compared to a standard binary classifier resulting on AUC ROC =0.94
Evidently, they learnt significantly worse features compared to a CNN but this may indicate that
the capability of feature extraction for a typical ConvNet is beyond what was necessary for our
application in their case.
These results can be of great importance in the standardization process for ML-based
cybersecurity solutions that are also used on edge computing. The better results of CNN models
indicate that they can be a primary solution in real-time threat detection where an accurate model
with low false positive rate has high importance. This is especially beneficial for the data's
ability to handle non-linear patterns and anomalies well, given that timely threat detection in
edge environments necessitates precise results. Although this may not top our leaderboards, its
performance from the Random Forest model indicates its utility in scenarios where
Page | 346
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
computational resources are limited. This performance and efficiency make it ideal for edge
devices with limited computational capacities.
This research provides critical findings, but some limitations must be appreciated. Evaluation in
a specific data set, so different types of data or when used for edge scenarios can have other
results. In the future, researchers will likely explore how well these models work in more diverse
space-time data sets to see if they generalize — or don't. Moreover, hybrid approaches that
utilize and integrate the strengths of different models may provide improved trade-off between
performance and flexibility. Incorporating CNNs with ensemble methods or other unsupervised
learning techniques for anomaly detection, such as VAE-based approaches can provide a more
holistic security solution. The research shows that implementing sophisticated ML models,
specifically deep learning-based architecture such as CNNs results in substantial milestones in
the field of orthogonalityized security for edge computing. Real-time use cases because they can
better identify and handle security incidents, especially with use cases related to handling
complex data patterns. This provides a simple but robust alternative, even on relatively
inexpensive systems – the Random Forest model. The results underscore the importance of
advancing research and applying hybrid methodologies to combat this dynamic (cybersecurity)
threat landscape effectively.
6.0 Conclusion
In this work we provide a detailed analysis of different machine learning (ML) models to make
the edge computing environment more secure, emphasizing their advantages and disadvantages
in real-time threat detection as well as mitigation. Results: The outcomes confirmed that CNN
provides more effective results than any other model as it achieved the highest accuracy,
precision, recall, and F1-score besides targeting an AUC-ROC. In this study, the considered
unique CNN architectures demonstrated superior detection capabilities in high-fidelity network
Page | 347
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
traffic patterns that contain actionable information for mission-critical security applications
involving real-time responses; requiring a reduction in both false positive and negative rates.
Though, the Random Forest model lags behind CNNs but has good accuracy and As compared to
AUC-ROC values it showed a strong performance. Which fits well since it is great with high-
dimensional data and needs less computing power. Hence, is a good choice for edge
environments as they have resource restrictions that rule out many other frameworks or
approaches like AutoML on devices themselves. Moreover, Decision Trees and Gradient
Boosting Machines delivered promising results but were only comparable to CNNs across the
board reflecting efficacy on some cybersecurity tasks yet hinting that these models may not take
full advantage of deeper-level features developments uniquely available in CNN frameworks.
However, the unsupervised models such as Isolation Forest and One-Class SVM achieved fewer
performance metrics than their supervised/deep learning counterparts Despite their performance
in scenarios where labeled data may be scarce, our results concur with previous findings and
imply that these models are not as good at identifying threats or reducing FPs when compared to
more traditional supervised learning approaches based on largescale training. This study
highlights the necessity of selecting an appropriate ML model according to specific application
conditions. In edge computing settings where granular and higher quality threat analysis is a
requirement, then Convolution Neural Networks (CNNs) are appropriate. On the other hand,
Random Forests provide a feasible and less demanding alternative in cases of low computational
power. The results also suggest the advantages of hybrid methodologies, combining model
strengths for improved threat detection potential. These hybrid models could be explored further,
and tested in different setups and future research should revolve around developing the field of
cybersecurity inside edge computing.
References:
Page | 348
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
2. Damaraju, A. (2020). Social Media as a Cyber Threat Vector: Trends and Preventive
Measures. Revista Espanola de Documentacion Cientifica, 14(1), 95-112.
3. Al Bashar, M., & Taher, M. A. Transforming US Manufacturing: Innovations in Supply
Chain Risk Management.
4. Oyeniyi, Johnson. "The role of AI and mobile apps in patient-centric healthcare
delivery." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 1897-
1907.
5. Pandiya , Dileep Kumar. 2022. “Performance Analysis of Microservices Architecture in
Cloud Environments”. International Journal on Recent and Innovation Trends in
Computing and Communication 10 (12):264-74.
https://ijritcc.org/index.php/ijritcc/article/view/10745.
6. Damaraju, A. (2021). Mobile Cybersecurity Threats and Countermeasures: A Modern
Approach. International Journal of Advanced Engineering Technologies and
Innovations, 1(3), 17-34.
7. Rehan, Hassan. "Internet of Things (IoT) in Smart Cities: Enhancing Urban Living
Through Technology." Journal of Engineering and Technology 5, no. 1 (2023): 1-16.
8. Pureti, N. (2022). Building a Robust Cyber Defense Strategy for Your Business. Revista
de Inteligencia Artificial en Medicina, 13(1), 35-51.
9. Bhowmick, D., T. Islam, and K. S. Jogesh. "Assessment of Reservoir Performance of a
Well in South-Eastern Part of Bangladesh Using Type Curve Analysis." Oil Gas Res 4,
no. 159 (2019): 2472-0518.
10. Rehan, Hassan. "Artificial Intelligence and Machine Learning: The Impact of Machine
Learning on Predictive Analytics in Healthcare." Innovative Computer Sciences
Journal 9, no. 1 (2023): 1-20.
11. S. . Reddy Gayam, R. . Reddy Yellu, and P. Thuniki, “Artificial Intelligence for Real-
Time Predictive Analytics: Advanced Algorithms and Applications in Dynamic Data
Environments”, Distrib Learn Broad Appl Sci Res, vol. 7, pp. 18–37, Feb. 2021,
Page | 349
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
Page | 350
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
20. Rehan, Hassan. "AI in Renewable Energy: Enhancing America's Sustainability and
Security."
21. Raparthi, Mohan. "Real-Time AI Decision Making in IoT with Quantum Computing:
Investigating & Exploring the Development and Implementation of Quantum-Supported
AI Inference Systems for IoT Applications." Internet of Things and Edge Computing
Journal 1, no. 1 (2021): 18-27.
22. Pureti, N. (2022). The Art of Social Engineering: How Hackers Manipulate Human
Behavior. International Journal of Machine Learning Research in Cybersecurity and
Artificial Intelligence, 13(1), 19-34.
23. Abdulla, Raed, Aden Abdillahi, and Maythem K. Abbas. "Electronic toll collection
system based on radio frequency identification system." International Journal of
Electrical and Computer Engineering (IJECE) 8, no. 3 (2018): 1602-1610.
24. Damaraju, A. (2021). Insider Threat Management: Tools and Techniques for Modern
Enterprises. Revista Espanola de Documentacion Cientifica, 15(4), 165-195.
25. Pureti, N. (2022). Zero-Day Exploits: Understanding the Most Dangerous Cyber
Threats. International Journal of Advanced Engineering Technologies and
Innovations, 1(2), 70-97.
26. Zoha, Ahmed, Junaid Qadir, and Qammer H. Abbasi. "AI-Powered IoT for Intelligent
Systems and Smart Applications." Frontiers in Communications and Networks 3 (2022):
959303.
27. Wu, Kexin, and Kun Chi. "Enhanced e-commerce customer engagement: A
comprehensive three-tiered recommendation system." Journal of Knowledge Learning
and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 348-359.
28. Charankar, Nilesh. 2024. “Microservices and API Deployment Optimization Using
AI”. International Journal on Recent and Innovation Trends in Computing and
Communication 11 (11):1090-95. https://doi.org/10.17762/ijritcc.v11i11.10618.
29. Dileep Kumar Pandiya, Nilesh Charankar, 2024, Optimizing Performance and Scalability
in Micro Services with CQRS Design, INTERNATIONAL JOURNAL OF
Page | 351
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
Page | 352
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
38. Wu, Kexin. "Creating panoramic images using ORB feature detection and RANSAC-
based image alignment." Advances in Computer and Communication 4, no. 4 (2023):
220-224.
39. Nunnagupala, Laxmi Sarat Chandra, Sukender Reddy Mallreddy, and Jaipal Reddy
Padamati. "Achieving PCI Compliance with CRM Systems." Turkish Journal of
Computer and Mathematics Education (TURCOMAT) 13, no. 1 (2022): 529-535.
40. Pureti, N. (2021). Penetration Testing: How Ethical Hackers Find Security
Weaknesses. International Journal of Machine Learning Research in Cybersecurity and
Artificial Intelligence, 12(1), 19-38.
41. Dileep Kumar Pandiya, Nilesh Charankar, 2024, Testing Strategies with Ai for
Microservices and Apis, INTERNATIONAL JOURNAL OF ENGINEERING
RESEARCH & TECHNOLOGY (IJERT) Volume 13, Issue 04 (April 2024),
42. Wu, Kexin. "Creating panoramic images using ORB feature detection and RANSAC-
based image alignment." Advances in Computer and Communication 4, no. 4 (2023):
220-224.
43. Kuparadze, A., & Sulakvelidze, N. (2024). A Revolutionary Approach to Deep Learning
for Multi-Modal Data Integration in Medical Diagnostics. Revista de Inteligencia
Artificial en Medicina, 15(1), 322-330.
44. Al-Jodah, Ammar, Hassan Zargarzadeh, and Maythem K. Abbas. "Experimental
verification and comparison of different stabilizing controllers for a rotary inverted
pendulum." In 2013 IEEE International Conference on Control System, Computing and
Engineering, pp. 417-423. IEEE, 2013.
45. Oyeniyi, Johnson. "Telemedicine and its impact on breast cancer survival in Sub-Saharan
Africa." International Research Journal of Modernization in Engineering Technology
and Science 6 (2024): 2582-5208.
46. Wu, Kexin. "Optimizing Diabetes Prediction with Machine Learning: Model
Comparisons and Insights." Journal of Science & Technology 5, no. 4 (2024): 41-51.
Page | 353
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
47. Aruleba, Idowu Thomas, and Yanxia Sun. "Healthcare Fraud Detection Using Machine
Learning." Available at SSRN 4631193 (2023).
48. Damaraju, A. (2022). Integrating Zero Trust with Cloud Security: A Comprehensive
Approach. Journal Environmental Sciences And Technology, 1(1), 279-291.
49. Prova, Nuzhat. "Detecting AI Generated Text Based on NLP and Machine Learning
Approaches." arXiv preprint arXiv:2404.10032 (2024).
50. Oyeniyi, Johnson, and Paul Oluwaseyi. "Emerging Trends in AI-Powered Medical
Imaging: Enhancing Diagnostic Accuracy and Treatment Decisions."
51. Dong, Hu Jia, Raed Abdulla, Sathish Kumar Selvaperumal, Shankar Duraikannan, Ravi
Lakshmanan, and Maythem K. Abbas. "Interactive on smart classroom system using
beacon technology." International Journal of Electrical & Computer Engineering (2088-
8708) 9, no. 5 (2019).
52. Pureti, N. (2021). Cyber Hygiene: Daily Practices for Maintaining Cybersecurity
Nagaraju Pureti. International Journal of Advanced Engineering Technologies and
Innovations, 1(3), 35-52.
53. Islam, M. Z., Nasiruddin, M., Dutta, S., Sikder, R., Huda, C. B., & Islam, M. R. (2024).
A Comparative Assessment of Machine Learning Algorithms for Detecting and
Diagnosing Breast Cancer. Journal of Computer Science and Technology Studies, 6(2),
121-135
54. Prova, Nuzhat. "A Study of Machine Learning Techniques for Predictive Analysis of
Health Insurance." Available at SSRN 4817382 (2024).
55. Damaraju, A. (2022). Social Media Cybersecurity: Protecting Personal and Business
Information. International Journal of Advanced Engineering Technologies and
Innovations, 1(2), 50-69.
56. Abbas, Maythem Kamal, Mohammad Noh Karsiti, Madzlan Napiah, and Brahim B.
Samir. "Traffic light control via VANET system architecture." In 2011 IEEE Symposium
on Wireless Technology and Applications (ISWTA), pp. 174-179. IEEE, 2011.
Page | 354
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
Page | 355
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
Page | 356
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
76. Nalla, L. N., & Reddy, V. M. (2020). Comparative Analysis of Modern Database
Technologies in Ecommerce Applications. International Journal of Advanced
Engineering Technologies and Innovations, 1(2), 21-39.
77. Maddireddy, B. R., & Maddireddy, B. R. (2022). Real-Time Data Analytics with AI:
Improving Security Event Monitoring and Management. Unique Endeavor in Business &
Social Sciences, 1(2), 47-62.
78. Yanamala, Anil Kumar Yadav, and Srikanth Suryadevara. "Adaptive Middleware
Framework for Context-Aware Pervasive Computing Environments." International
Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence 13,
no. 1 (2022): 35-57.
79. Yanamala, Anil Kumar Yadav. "Cost-Sensitive Deep Learning for Predicting Hospital
Readmission: Enhancing Patient Care and Resource Allocation." International Journal of
Advanced Engineering Technologies and Innovations 1, no. 3 (2022): 56-81.
80. Reddy, V. M. (2021). Blockchain Technology in E-commerce: A New Paradigm for Data
Integrity and Security. Revista Espanola de Documentacion Cientifica, 15(4), 88-107.
81. Maddireddy, B. R., & Maddireddy, B. R. (2022). AI-Based Phishing Detection
Techniques: A Comparative Analysis of Model Performance. Unique Endeavor in
Business & Social Sciences, 1(2), 63-77.
82. Suryadevara, Srikanth. "Enhancing Brain-Computer Interface Applications through IoT
Optimization." Revista de Inteligencia Artificial en Medicina 13, no. 1 (2022): 52-76.
83. Maddireddy, B. R., & Maddireddy, B. R. (2021). Evolutionary Algorithms in AI-Driven
Cybersecurity Solutions for Adaptive Threat Mitigation. International Journal of
Advanced Engineering Technologies and Innovations, 1(2), 17-43.
84. Maddireddy, B. R., & Maddireddy, B. R. (2021). Cyber security Threat Landscape:
Predictive Modelling Using Advanced AI Algorithms. Revista Espanola de
Documentacion Cientifica, 15(4), 126-153.
Page | 357
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
Page | 358
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
Page | 359
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
Page | 360
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
112. Bommu, R., Parojit, S., Singh, N., & Sharma, M. (2020). Review of Data-driven AI
approaches for Precision Screening of Drug Targets. International Bulletin of
Linguistics and Literature (IBLL), 3(1), 48-55.
113. Srivastava, Anshul, Mounika Nalluri, Tarun Lata, Geetha Ramadas, N. Sreekanth, and
Hrishikesh Bhanudas Vanjari. "Scaling AI-Driven Solutions for Semantic Search."
In 2023 International Conference on Power Energy, Environment & Intelligent Control
(PEEIC), pp. 1581-1586. IEEE, 2023.
114. Ekatpure, Rahul. "Machine Learning Algorithms for Enhancing Autonomous Vehicle
Navigation and Control Systems: Techniques, Models, and Real-World
Applications." Asian Journal of Multidisciplinary Research & Review 1, no. 2 (2020):
77-95.
115. Nallur, Mounika, M. Sandhya, Zabiha Khan, B. R. Mohan, C. P. Nayana, and S. A.
Rajashekhar. "African Vultures Based Feature Selection with Multi-modal Deep
Learning for Automatic Seizure Prediction." In 2024 International Conference on
Distributed Computing and Optimization Techniques (ICDCOT), pp. 1-7. IEEE, 2024.
116. Ekatpure, Rahul. "Machine Learning Techniques for Advanced Driver Assistance
Systems (ADAS) in Automotive Development: Models, Applications, and Real-World
Case Studies." Asian Journal of Multidisciplinary Research & Review 3, no. 6 (2022):
248-304.
117. Pargaonkar, Shravan. "A Review of Software Quality Models: A Comprehensive
Analysis." Journal of Science & Technology 1.1 (2020): 40-53.
118. Christidis K, Devetsikiotis M. Blockchains and Smart Contracts for the Internet of
Things. IEEE Access. 2016;4:2292-2303. doi: 10.1109/ACCESS.2016.2566339.
119. Pargaonkar, Shravan. "Bridging the Gap: Methodological Insights from Cognitive
Science for Enhanced Requirement Gathering." Journal of Science & Technology 1.1
(2020): 61-66.
120. Crosby M, Pattanayak P, Verma S, Kalyanaraman V. Blockchain technology: Beyond
bitcoin. Appl Innov Rev. 2016 May;2(6):6-13.
Page | 361
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
121. Pargaonkar, Shravan. "Future Directions and Concluding Remarks Navigating the
Horizon of Software Quality Engineering." Journal of Science & Technology 1.1 (2020):
67-81.
122. Dubey R, Gunasekaran A, Childe SJ, Papadopoulos T. Big data analytics and artificial
intelligence pathway to operational performance under the effects of entrepreneurial
orientation and environmental dynamism: A study of manufacturing organisations. Int J
Prod Econ. 2019 Jan; 34-51. doi: 10.1016/j.ijpe.2018.11.009.
123. Pargaonkar, S. (2020). A Review of Software Quality Models: A Comprehensive
Analysis. Journal of Science & Technology, 1(1), 40-53.
124. Huang K, Liu G, Xu X, Zhang L. A deep learning model for smart grid data imputation
considering spatiotemporal correlation. IEEE Trans Smart Grid. 2021 Jan;12(1):291-300.
doi: 10.1109/TSG.2020.3008104.
125. Pargaonkar, S. (2020). Bridging the Gap: Methodological Insights from Cognitive
Science for Enhanced Requirement Gathering. Journal of Science & Technology, 1(1),
61-66.
126. Korpela K, Hallikas J, Dahlberg T. Digital supply chain transformation toward
blockchain integration: A case study of a small and medium-sized enterprise. J Comput
Inf Syst. 2017 Jul 3;58(4):316-326. doi: 10.1080/08874417.2017.1375787.
127. Pargaonkar, S. (2020). Future Directions and Concluding Remarks Navigating the
Horizon of Software Quality Engineering. Journal of Science & Technology, 1(1), 67-81.
128. Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L. ProvChain: A Blockchain-
based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and
Availability. In: IEEE/ACM International Symposium on Cluster, Cloud and Grid
Computing. IEEE Computer Society. 2017 May 14 (pp. 468-477).
129. Padmanaban, P. H., and Yogesh Kumar Sharma. "Implication of Artificial Intelligence in
Software Development Life Cycle: A state of the art review." 2019 IJRRA all rights
reserved (2019).
Page | 362
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
130. Pureti, Nagaraju. "Incident Response Planning: Preparing for the Worst in
Cybersecurity." Revista de Inteligencia Artificial en Medicina 12, no. 1 (2021): 32-50.
131. Pureti, Nagaraju. "Penetration Testing: How Ethical Hackers Find Security Weaknesses."
International Journal of Machine Learning Research in Cybersecurity and Artificial
Intelligence 12, no. 1 (2021): 19-38.
132. Abdulla, Raed, Aden Abdillahi, and Maythem K. Abbas. "Electronic toll collection
system based on radio frequency identification system." International Journal of
Electrical and Computer Engineering (IJECE) 8, no. 3 (2018): 1602-1610.
133. Maddireddy, Bhargava Reddy, and Bharat Reddy Maddireddy. "Evolutionary Algorithms
in AI-Driven Cybersecurity Solutions for Adaptive Threat Mitigation." International
Journal of Advanced Engineering Technologies and Innovations 1, no. 2 (2021): 17-43.
134. Reddy, Vijay Mallik, and Lakshmi Nivas Nalla. "The Impact of Big Data on Supply
Chain Optimization in Ecommerce." International Journal of Advanced Engineering
Technologies and Innovations 1, no. 2 (2020): 1-20.
135. Pureti, Nagaraju. "Cyber Hygiene: Daily Practices for Maintaining Cybersecurity
Nagaraju Pureti." International Journal of Advanced Engineering Technologies and
Innovations 1, no. 3 (2021): 35-52.
136. Padmanaban, P. H., and Yogesh Kumar Sharma. "Implication of Artificial Intelligence in
Software Development Life Cycle: A state of the art review." 2019 IJRRA all rights
reserved (2019).
137. Pureti, Nagaraju. "The Role of Cyber Forensics in Investigating Cyber Crimes." Revista
de Inteligencia Artificial en Medicina 11, no. 1 (2020): 19-37.
138. Mohammad, A., Das, R., Islam, M. A., & Mahjabeen, F. (2023). AI in VLSI Design
Advances and Challenges: Living in the Complex Nature of Integrated Devices. Asian
Journal of Mechatronics and Electrical Engineering, 2(2), 121-132.
139. Ray, R. K., Chowdhury, F. R., & Hasan, M. R. (2024). Blockchain Applications in Retail
Cybersecurity: Enhancing Supply Chain Integrity, Secure Transactions, and Data
Protection. Journal of Business and Management Studies, 6(1), 206-214.
Page | 363
REVISTA DE INTELIGENCIA ARTIFICIAL EN MEDICINA
140. Mohammad, A., Das, R., & Mahjabeen, F. (2023). Synergies and Challenges: Exploring
the Intersection of Embedded Systems and Computer Architecture in the Era of Smart
Technologies. Asian Journal of Mechatronics and Electrical Engineering, 2(2), 105-120.
141. Rasel, M., Salam, M. A., & Mohammad, A. (2023). Safeguarding Media Integrity:
Cybersecurity Strategies for Resilient Broadcast Systems and Combatting Fake News.
Unique Endeavor in Business & Social Sciences, 2(1), 72-93.
142. RASEL, M., Salam, M. A., Shovon, R. B., & Islam, M. A. (2023). Fortifying Media
Integrity: Cybersecurity Practices and Awareness in Bangladesh's Media Landscape.
Unique Endeavor in Business & Social Sciences, 2(1), 94-119.
143. Rasel, M., Mohammad, A., Salam, M. A., Islam, M. A., & Shovon, R. B. (2024). Multi-
Modal Approaches to Fake News Detection: Text, Image, and Video Analysis.
International Journal of Advanced Engineering Technologies and Innovations, 1(3), 449-
475.
Page | 364