Performance analysis of blockchain-enabled security and privacy algorithms in connected and autonomous vehicles: a comprehensive review
Strategic investment (s) in vehicle automation technologies led to the rapid development of
technology that revolutionised transport services and reduced fatalities on a scale never …
technology that revolutionised transport services and reduced fatalities on a scale never …
Confidential computing in cloud/fog-based Internet of Things scenarios
Abstract Internet of Things (IoT) devices are increasingly present in people's daily lives,
collecting different types of data about the environment, user behavior, medical data, and …
collecting different types of data about the environment, user behavior, medical data, and …
[PDF][PDF] Neural Cryptography with Fog Computing Network for Health Monitoring Using IoMT.
G Ravikumar, K Venkatachalam, MA AlZain… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
Sleep apnea syndrome (SAS) is a breathing disorder while a person is asleep. The
traditional method for examining SAS is Polysomnography (PSG). The standard procedure …
traditional method for examining SAS is Polysomnography (PSG). The standard procedure …
Acoustical observation with multiple wave gliders for internet of underwater things
One of the challenges of Internet of Underwater Things (IoUT) is the design of nodes for
collecting information from underwater, with features of low cost, long term, long range …
collecting information from underwater, with features of low cost, long term, long range …
Application of machine learning for ransomware detection in IoT devices
Internet users have been faced with a lot of threats with the growth of malware around the
world. Ransomware, one of the significant types of malware, encrypts sensitive information …
world. Ransomware, one of the significant types of malware, encrypts sensitive information …
A review of detection of pest problem in rice farming by using blockchain and IoT technologies
T Hidayat, R Mahardiko - Journal of Computer Networks …, 2021 - jurnal.itscience.org
Pest can be a serious topic in agricultural areas especially rice plantations. The pest
destroys the plants before harvesting time. Because of the presence of the pest, the yield of …
destroys the plants before harvesting time. Because of the presence of the pest, the yield of …
Advancement of deep learning in big data and distributed systems
AS Ahmed, MS Abood… - 2021 3rd international …, 2021 - ieeexplore.ieee.org
Digital computing space has grown dramatically since the beginning of the 2000s to deal
with an increase in data proliferation. These come from a wide variety area. For example, the …
with an increase in data proliferation. These come from a wide variety area. For example, the …
Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things
The Medical Internet of Things (MIoT) requires extreme information and communication
security, particularly for remote consultation systems. MIoT's integration of physical and …
security, particularly for remote consultation systems. MIoT's integration of physical and …
Role of blockchain technology in digital forensics
Blockchain is a progression of associated information structures called blocks, which contain
or track all that occurs in disseminated frameworks in a distributed organization. Each block …
or track all that occurs in disseminated frameworks in a distributed organization. Each block …
Trust based intrusion detection system to detect insider attacks in IoT systems
IoT systems are vulnerable to various cyber attacks as they form a subset of the Internet.
Insider attacks find more significance since many devices are configured to access the …
Insider attacks find more significance since many devices are configured to access the …