Qos-aware fog node placement for intensive iot applications in sdn-fog scenarios
The advent of the Internet of Things (IoT) paradigm to intensive domains, such as industry, is
a key enabler for the automation of critical, real-world processes. The strict Quality-of …
a key enabler for the automation of critical, real-world processes. The strict Quality-of …
SIM-FED: Secure IoT malware detection model with federated learning
Many IoT devices are presently in use without sufficient security measures. The vulnerability
of these devices to malware highlights the necessity for effective methods to identify …
of these devices to malware highlights the necessity for effective methods to identify …
Data flow management and compliance in cloud computing
As cloud computing becomes an increasingly dominant means of providing computing
resources, the legal and regulatory issues associated with data in the cloud become more …
resources, the legal and regulatory issues associated with data in the cloud become more …
A study on privacy issues in internet of things (IoT)
N Zainuddin, M Daud, S Ahmad… - 2021 IEEE 5th …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is an interconnected wireless network where smart nodes (IoT
devices) interact with each other in order to exchange data through the communicating …
devices) interact with each other in order to exchange data through the communicating …
Survey on secure search over encrypted data on the cloud
H Pham, J Woodworth… - … : Practice and Experience, 2019 - Wiley Online Library
Cloud computing has become a potential resource for businesses and individuals to
outsource their data to remote but highly accessible servers. However, the potential of cloud …
outsource their data to remote but highly accessible servers. However, the potential of cloud …
A toolkit for construction of authorization service infrastructure for the internet of things
The challenges posed by the Internet of Things (IoT) render existing security measures
ineffective against emerging networks and devices. These challenges include …
ineffective against emerging networks and devices. These challenges include …
[图书][B] Internet of Things, for Things, and by Things
A Chaudhuri - 2018 - taylorfrancis.com
This book explains IoT technology, its potential applications, the security and privacy
aspects, the key necessities like governance, risk management, regulatory compliance …
aspects, the key necessities like governance, risk management, regulatory compliance …
Trust management for software-defined heterogeneous vehicular ad hoc networks
Over the past few decades, a considerable amount of interest has been observed (in both
academia and industry) for improving the overall road transportation across the globe …
academia and industry) for improving the overall road transportation across the globe …
[PDF][PDF] IoT: application protocols and security
D Johnson, M Ketel - International Journal of Computer Network and …, 2019 - mecs-press.org
The Internet of Things (IoT) commands an ever-growing population of devices across the
nation and abroad. The development of privacy concerns and security goals have not kept …
nation and abroad. The development of privacy concerns and security goals have not kept …
IoT security: ZWave and thread
I Unwala, Z Taqvi, J Lu - 2018 IEEE Green Technologies …, 2018 - ieeexplore.ieee.org
This paper reviews the security aspects of two Internet-of-Things (IoT) protocols, Z-Wave and
Thread. Z-Wave is one of the oldest and most commercially successful IoT protocol, while …
Thread. Z-Wave is one of the oldest and most commercially successful IoT protocol, while …