Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions

AR Khan, M Kashif, RH Jhaveri, R Raut… - Security and …, 2022 - Wiley Online Library
In the last decade, huge growth is recorded globally in computer networks and Internet of
Things (IoT) networks due to the exponential data generation, approximately zettabyte to a …

[HTML][HTML] Forest 4.0: Digitalization of forest using the Internet of Things (IoT)

R Singh, A Gehlot, SV Akram, AK Thakur… - Journal of King Saud …, 2022 - Elsevier
Abstract “Digitalization of forest”, as this phrase itself suggests the sustainable
implementation of cutting-edge technologies into forests for improving the current trends that …

A computation offloading method over big data for IoT-enabled cloud-edge computing

X Xu, Q Liu, Y Luo, K Peng, X Zhang, S Meng… - Future Generation …, 2019 - Elsevier
The Internet of mobile things is a burgeoning technique that generates, stores and
processes big real-time data to render rich services for mobile users. In order to mitigate …

APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT

Z Guan, Y Zhang, L Wu, J Wu, J Li, Y Ma… - Journal of Network and …, 2019 - Elsevier
Fog computing is a modern computing platform that connects the cloud with the edge smart
devices located at the edge of the network. The fog computing platform has several …

Empirical vulnerability analysis of automated smart contracts security testing on blockchains

RM Parizi, A Dehghantanha, KKR Choo… - arXiv preprint arXiv …, 2018 - arxiv.org
The emerging blockchain technology supports decentralized computing paradigm shift and
is a rapidly approaching phenomenon. While blockchain is thought primarily as the basis of …

Time-aware distributed service recommendation with privacy-preservation

L Qi, R Wang, C Hu, S Li, Q He, X Xu - Information Sciences, 2019 - Elsevier
As a promising way to extract insightful information from massive data, service
recommendation has gained ever-increasing attentions in both academic and industrial …

SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism

M Zaminkar, R Fotohi - Wireless Personal Communications, 2020 - Springer
Abstract Through the Internet of Things (IoT) the internet scope is established by the
integration of physical things to classify themselves into mutual things. A physical thing can …

An IoT-oriented data placement method with privacy preservation in cloud environment

X Xu, S Fu, L Qi, X Zhang, Q Liu, Q He, S Li - Journal of Network and …, 2018 - Elsevier
Abstract IoT (Internet of Things) devices generate huge amount of data which require rich
resources for data storage and processing. Cloud computing is one of the most popular …

Blockchain based credibility verification method for IoT entities

C Qu, M Tao, J Zhang, X Hong… - Security and …, 2018 - Wiley Online Library
With the fast development of mobile Internet, Internet of Things (IoT) has been found in many
important applications recently. However, it still faces many challenges in security and …

[HTML][HTML] MalInsight: A systematic profiling based malware detection framework

W Han, J Xue, Y Wang, Z Liu, Z Kong - Journal of Network and Computer …, 2019 - Elsevier
To handle the security threat faced by the widespread use of Internet of Things (IoT) devices
due to the ever-lasting increase of malware, the security researchers increasingly rely on …