A survey of security in cloud, edge, and fog computing
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …
Simultaneously, different computing paradigms from Cloud computing to Edge computing …
SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising
P Manoharan, R Walia, C Iwendi, TA Ahanger… - Expert …, 2023 - Wiley Online Library
Abstract Machine learning are vulnerable to the threats. The Intruders can utilize the
malicious nature of the nodes to attack the training dataset to worsen the process and …
malicious nature of the nodes to attack the training dataset to worsen the process and …
Blockchain based solutions to secure IoT: Background, integration trends and a way forward
The lack of intrinsic security technologies in the current Internet of Things (IoT) systems
brings forth numerous security vulnerabilities and privacy risks. To this end, a distributed and …
brings forth numerous security vulnerabilities and privacy risks. To this end, a distributed and …
Privacy-preserved data sharing towards multiple parties in industrial IoTs
The effective physical data sharing has been facilitating the functionality of Industrial IoTs,
which is believed to be one primary basis for Industry 4.0. These physical data, while …
which is believed to be one primary basis for Industry 4.0. These physical data, while …
Internet of things (IoT) security dataset evolution: Challenges and future directions
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …
Blockchain-empowered space-air-ground integrated networks: Opportunities, challenges, and solutions
The terrestrial networks face the challenges of severe cost inefficiency and low feasibility to
provide seamless services anytime and anywhere, especially in the extreme or hotspot …
provide seamless services anytime and anywhere, especially in the extreme or hotspot …
A survey of IoT security based on a layered architecture of sensing and data analysis
The Internet of Things (IoT) is leading today's digital transformation. Relying on a
combination of technologies, protocols, and devices such as wireless sensors and newly …
combination of technologies, protocols, and devices such as wireless sensors and newly …
The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial
This article presents research challenges and a tutorial on performance evaluation of
blockchain-based security and privacy systems for the Internet of Things (IoT). We start by …
blockchain-based security and privacy systems for the Internet of Things (IoT). We start by …
A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones
A Heidari, NJ Navimipour… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The Internet of Drones (IoD) is built on the Internet of Things (IoT) by replacing “Things” with
“Drones” while retaining incomparable features. Because of its vital applications, IoD …
“Drones” while retaining incomparable features. Because of its vital applications, IoD …
Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions
Abstract The Internet of Things (IoTs) enables coupling of digital and physical objects using
worthy communication technologies and introduces a future vision where computing …
worthy communication technologies and introduces a future vision where computing …