A survey of security in cloud, edge, and fog computing
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …
Simultaneously, different computing paradigms from Cloud computing to Edge computing …
Blockchain meets cloud computing: A survey
Blockchain technology has been deemed to be an ideal choice for strengthening existing
computing systems in varied manners. As one of the network-enabled technologies, cloud …
computing systems in varied manners. As one of the network-enabled technologies, cloud …
Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model
Cyber–physical system (CPS) is the incorporation of physical processes with processing
and data transmission. Cybersecurity is a primary and challenging issue in healthcare due …
and data transmission. Cybersecurity is a primary and challenging issue in healthcare due …
Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions
A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …
proliferation in the number of Internet users has presented attackers with new detrimental …
Computation offloading toward edge computing
We are living in a world where massive end devices perform computing everywhere and
everyday. However, these devices are constrained by the battery and computational …
everyday. However, these devices are constrained by the battery and computational …
[HTML][HTML] Open RAN security: Challenges and opportunities
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …
(Radio Access Network), which defines interfaces that support inter-operation between …
Differential privacy techniques for cyber physical systems: A survey
MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …
development of information and communication technologies (ICT). With the provision of …
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions
In recent times, the machine learning (ML) community has recognized the deep learning
(DL) computing model as the Gold Standard. DL has gradually become the most widely …
(DL) computing model as the Gold Standard. DL has gradually become the most widely …
Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Security and privacy in cloud computing: technical review
YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …
to the popularity and success of cloud computing. Cloud computing offers advantages and …