[HTML][HTML] Network optimizations in the Internet of Things: A review
The Internet was initially used to transfer data packets between users and data sources with
a specific IP address. Due to advancements, the Internet is being used to share data among …
a specific IP address. Due to advancements, the Internet is being used to share data among …
Intelligence in IoT-based 5G networks: Opportunities and challenges
The requirement of high data rates, low latency, efficient use of spectrum, and coexistence of
different network technologies are major considerations in Internet of Things (IoT)-based fifth …
different network technologies are major considerations in Internet of Things (IoT)-based fifth …
Interoperability in internet of things: Taxonomies and open challenges
In the last few years, many smart objects found in the physical world are interconnected and
communicate through the existing internet infrastructure which creates a global network …
communicate through the existing internet infrastructure which creates a global network …
[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …
supports demanded services. The architecture of cloud computing consists of different kinds …
Secure and reliable wsn for internet of things: Challenges and enabling technologies
Wireless Sensor Network (WSN) is an innovative technology with a broad range of
applications and highly attractive benefits, such as low cost of implementation and data …
applications and highly attractive benefits, such as low cost of implementation and data …
A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)
MD Alshehri, FK Hussain - Computing, 2019 - Springer
Recently, the Internet of things (IoT) has received a lot of attention from both industry and
academia. A reliable and secure IoT connection and communication is essential for the …
academia. A reliable and secure IoT connection and communication is essential for the …
Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system
A Poniszewska-Maranda, D Kaczmarek, N Kryvinska… - Computing, 2019 - Springer
Abstract The Internet of Things (IoT) has emerged as a disruptive technology for the current
and future of computing and communication. IoT is characterized by a variety of …
and future of computing and communication. IoT is characterized by a variety of …
Quality-aware and fine-grained incentive mechanisms for mobile crowdsensing
Limited research efforts have been made for Mobile CrowdSensing (MCS) to address quality
of the recruited crowd, ie, quality of services/data each individual mobile user and the whole …
of the recruited crowd, ie, quality of services/data each individual mobile user and the whole …
A multi-target approach to estimate software vulnerability characteristics and severity scores
Software vulnerabilities constitute a great risk for the IT community. The specification of the
vulnerability characteristics is a crucial procedure, since the characteristics are used as input …
vulnerability characteristics is a crucial procedure, since the characteristics are used as input …
Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research
Abstract As the Internet of Things (IoT) recently attains tremendous popularity, this promising
technology leads to a variety of security challenges. The traditional solutions do not fit the …
technology leads to a variety of security challenges. The traditional solutions do not fit the …