<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="20412" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/20412?output=omeka-xml" accessDate="2026-05-01T08:12:44+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181305">
              <text>Detection of Various Security Threats in IoT and Cloud Computing using Machine Learning</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181306">
              <text>Artificial Intelligence; Cloud Computing; COVID; Internet of Things (IoT); Machine Learning</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181307">
              <text>Due to the growth of internet technology, there is a sharp rise in the growth of IoT enabled devices. IoT (Internet of Things) refers to the connection of various embedded devices with limited processing and memory. With the heavy adoption of IoT applications, cloud computing is gaining traction with the ever-increasing demand to process and compute a massive amount of data coming from various devices. Hence, cloud computing and IoT are often related to each other. However, there are two challenges in deploying the IoT and cloud computing frameworks: security and Privacy. This article discusses various types of security threats affecting IoT and cloud computing, and threats are classified using machine learning (ML). ML has gained much momentum in recent years and is applied in various domains. One of the main subdomains of machine learning is used in IoT and cloud security. A machine learning model can be trained with data based on which the model can predict the impending security threats. Popular security techniques to protect IoT devices from hackers are IoT authentication, access control, malware detection, and secure overloading. Supervised learning algorithms can be used to detect malware in the runtime behavior of applications. The malware is detected from network traffic and is labeled based on its suspicious behavior. Post identification of malware, the application data is stored in a database trained via an ML classifier algorithm (KNN or Random Forest). With increased training, the model can identify malware applications with higher accuracy.   2022 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181308">
              <text>Joseph T.A.; Jayapandian N.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="181309">
              <text>International Conference on Sustainable Computing and Data Communication Systems, ICSCDS 2022 - Proceedings, pp. 996-1001.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="181310">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181311">
              <text>2022-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="181312">
              <text>&lt;a href="https://doi.org/10.1109/ICSCDS53736.2022.9760791" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ICSCDS53736.2022.9760791&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130090123&amp;amp;doi=10.1109%2FICSCDS53736.2022.9760791&amp;amp;partnerID=40&amp;amp;md5=046f6405b0fe607215c41d48ab635383" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130090123&amp;amp;doi=10.1109%2fICSCDS53736.2022.9760791&amp;amp;partnerID=40&amp;amp;md5=046f6405b0fe607215c41d48ab635383&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181313">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="181314">
              <text>ISBN: 978-166547884-7</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181315">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181316">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181317">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="181318">
              <text>Joseph T.A., School of Engineering and Technology, Christ (Deemed to Be University), India; Jayapandian N., School of Engineering and Technology, Christ (Deemed to Be University), India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
