Correlation-aware Multi-dimensional Service Quality Prediction and Recommendation with Privacy-preservation in IoT

L QI, W ZHONG, C HU, X ZHOU… - Chinese Journal of …, 2023 - cje.ejournal.org.cn
Benefiting from the low data transmission requirements from user clients to remote cloud
centers, edge computing has emerged as a lightweight and cost-effective solution for …

Security and Privacy Preservation Method Based on Data Disturbance for Collaborative Edge Computing for Social-Internet-of-Things (S-IoT)

KR Venugopal - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Socia1 Internet of Things (SIoT) is new paradigm that integrate human social with physical
Internet of Things (IoT) systems, social IoT is ray of hope in providing ubiquitous connectivity …

[PDF][PDF] Innovative Technologies for Smart Urban Mobility Management

F Martella - 2023 - iris.unime.it
This PhD thesis investigates the application of ICT (Information Computer Technologies) in
the field of urban mobility. The objective is not to study and solve urban planning problems …

[PDF][PDF] Physical and Cyber Systems for Smart Environments: IoT and Digital Twins

V Lukaj - 2023 - iris.unime.it
This PhD thesis investigates new solutions for the setup of Physical and Cyber Systems in
Smart Environments aimed at the evolution of Smart Cities. The objective of this thesis is to …

A Survey of IoT Considerations, Requirements, Architectures and Their Potentials for Machine Learning Applications

RK Yellapragada, KK Murthy - Disruptive technologies in …, 2024 - taylorfrancis.com
This survey paper presents a comprehensive analysis of IoT considerations, requirements,
architectures, and their potentials for machine learning applications. The objective of this …

Edge Computing Security for IoT: A Systematic Literature Review

A Johnsson, A Nordling - 2023 - diva-portal.org
This study conducts a systematic literature review (SLR) to explore the security threats, their
mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the …

Innovative Approaches for Accurate User Monitoring

S Naithani, V Kumar - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
The increasing prevalence of malware and viruses in computer systems, as well as the
emergence of zero-day vulnerabilities, have made traditional security analysis methods …

Android Malware Detection Using Machine Learning Technique

SK Nor'Afifah Sabri¹, Z Zainudin - Advances in Intelligent Computing … - books.google.com
Malware is a common term used to describe different types of malicious activities or
inappropriate applications, such as viruses, worms, spyware, Trojans, rootkits and …

Artificial Intelligence (AI) Equipped Edge Internet of Things (IoT) Devices in Security

N Agrawal, A Saxena - Advanced IoT Technologies and Applications in … - taylorfrancis.com
With today's military and defense technology, artificial intelligence (AI) is a key component.
Target discrimination is the process to analyze the buildup of enemy forces, which makes …

[PDF][PDF] Blockchain in Edge-Cloud Computing Continuum

IE Bassey - kodu.ut.ee
In the era of Edge Computing, Internet of Things (IoT) devices connect and communicate to
create a network of objects that can collect information from the environment without human …