Fast, reliable, and secure drone communication: A comprehensive survey
Drone security is currently a major topic of discussion among researchers and industrialists.
Although there are multiple applications of drones, if the security challenges are not …
Although there are multiple applications of drones, if the security challenges are not …
Smart home security: challenges, issues and solutions at different IoT layers
Abstract The Internet of Things is a rapidly evolving technology in which interconnected
computing devices and sensors share data over the network to decipher different problems …
computing devices and sensors share data over the network to decipher different problems …
An empirical study on system level aspects of Internet of Things (IoT)
Internet of Things (IoT) is an integration of the Sensor, Embedded, Computing, and
Communication technologies. The purpose of the IoT is to provide seamless services to …
Communication technologies. The purpose of the IoT is to provide seamless services to …
Intrusion detection based on autoencoder and isolation forest in fog computing
Fog Computing has emerged as an extension to cloud computing by providing an efficient
infrastructure to support IoT. Fog computing acting as a mediator provides local processing …
infrastructure to support IoT. Fog computing acting as a mediator provides local processing …
Security challenges for drone communications: Possible threats, attacks and countermeasures
The current development of drones and the prospects in this field have positive
repercussions, in particular for employment and industrial development, with the key to …
repercussions, in particular for employment and industrial development, with the key to …
Machine-learning-assisted security and privacy provisioning for edge computing: A survey
S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …
millions of sensors and provide services at the device end. The broad vision of EC integrates …
Optimized machine learning-based intrusion detection system for fog and edge computing environment
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …
An overview of fog computing and edge computing security and privacy issues
AM Alwakeel - Sensors, 2021 - mdpi.com
With the advancement of different technologies such as 5G networks and IoT the use of
different cloud computing technologies became essential. Cloud computing allowed …
different cloud computing technologies became essential. Cloud computing allowed …
IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …
devices are especially damaging and need to be addressed. In this treatise, we overview …
On the control of microgrids against cyber-attacks: A review of methods and applications
Nowadays, the use of renewable generations, energy storage systems (ESSs) and
microgrids (MGs) has been developed due to better controllability of distributed energy …
microgrids (MGs) has been developed due to better controllability of distributed energy …