IoT and Cloud computing issues, challenges and opportunities: A review
MM Sadeeq, NM Abdulkareem… - Qubahan Academic …, 2021 - journal.qubahan.com
With the exponential growth of the Industrial Internet of Things (IIoT), multiple outlets are
constantly producing a vast volume of data. It is unwise to locally store all the raw data in the …
constantly producing a vast volume of data. It is unwise to locally store all the raw data in the …
Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities
N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
The fifth generation (5G) wireless technologies serve as a key propellent to meet the
increasing demands of the future Internet of Things (IoT) networks. For wireless …
increasing demands of the future Internet of Things (IoT) networks. For wireless …
[PDF][PDF] Investigating the use of an artificial intelligence model in an ERP cloud-based system
N Yathiraju - International Journal of Electrical, Electronics and …, 2022 - academia.edu
Enterprise Resource Planning (ERP) systems are necessary to improve an enterprise's
management performance. However, the perception of information technology (IT) …
management performance. However, the perception of information technology (IT) …
“why should i trust your ids?”: An explainable deep learning framework for intrusion detection systems in internet of things networks
Z Abou El Houda, B Brik… - IEEE Open Journal of the …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging paradigm that is turning and revolutionizing
worldwide cities into smart cities. However, this emergence is accompanied with several …
worldwide cities into smart cities. However, this emergence is accompanied with several …
Comprehensive survey of big data mining approaches in cloud systems
ZS Ageed, SRM Zeebaree… - Qubahan Academic …, 2021 - journal.qubahan.com
Cloud computing, data mining, and big online data are discussed in this paper as
hybridization possibilities. The method of analyzing and visualizing vast volumes of data is …
hybridization possibilities. The method of analyzing and visualizing vast volumes of data is …
Energy management for internet of things via distributed systems
MAM Sadeeq, S Zeebaree - Journal of Applied Science and Technology …, 2021 - jastt.org
The distributed energy system (DES) architecture is subject to confusion about renewable
energy limits, primary energy supply and energy carriers' costs. For the grid to use unreliable …
energy limits, primary energy supply and energy carriers' costs. For the grid to use unreliable …
Task scheduling algorithms in cloud computing: A review
IM Ibrahim - Turkish Journal of Computer and Mathematics …, 2021 - turcomat.org
Cloud computing is the requirement based on clients and provides many resources that aim
to share it as a service through the internet. For optimal use, Cloud computing resources …
to share it as a service through the internet. For optimal use, Cloud computing resources …
Cloud computing virtualization of resources allocation for distributed systems
Cloud computing is a new technology which managed by a third party “cloud provider” to
provide the clients with services anywhere, at any time, and under various circumstances. In …
provide the clients with services anywhere, at any time, and under various circumstances. In …
Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications
The growth of the Internet of Things (IoT) offers numerous opportunities for developing
industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising …
industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising …
Machine learning approaches for combating distributed denial of service attacks in modern networking environments
A Aljuhani - IEEE Access, 2021 - ieeexplore.ieee.org
A distributed denial of service (DDoS) attack represents a major threat to service providers.
More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by …
More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by …