BIM security: A critical review and recommendations using encryption strategy and blockchain
Security of information in collaborative BIM platforms is crucial particularly for critical projects
such as that of government buildings, prisons, and power plants. Inappropriate distribution …
such as that of government buildings, prisons, and power plants. Inappropriate distribution …
Cloud-edge orchestration for the Internet of Things: Architecture and AI-powered data processing
Y Wu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has been deeply penetrated into a wide range of important and
critical sectors, including smart city, water, transportation, manufacturing, and smart factory …
critical sectors, including smart city, water, transportation, manufacturing, and smart factory …
Intelligent fog computing surveillance system for crime and vulnerability identification and tracing
IoT devices generate enormous amounts of data, which deep learning algorithms can learn
from more effectively than shallow learning algorithms. The approach for threat detection …
from more effectively than shallow learning algorithms. The approach for threat detection …
Lightweight cryptographic protocols for IoT-constrained devices: A survey
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …
Elliptic curve lightweight cryptography: A survey
CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …
industry and academy from different perspectives. Some of these aspects include …
Rooted learning model at fog computing analysis for crime incident surveillance
Cyber Loopholes in smart devices' applications invited intruders to conduct malicious
activities. The growing quantity and diversity of smart devices has posed significant cyber …
activities. The growing quantity and diversity of smart devices has posed significant cyber …
[PDF][PDF] Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey.
FA Alhaidari, EJ Alqahtani - J. Commun., 2020 - jocm.us
Nowadays, cloud computing and IoT devices are widely used and involved in our life.
However, the current cloud computing paradigm still have some limitation mainly related to …
However, the current cloud computing paradigm still have some limitation mainly related to …
Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions
The growth of Internet of Things (IoT) took center stage universally due their capability to
advance the course of human lives. Consequent upon this, several challenges were thrown …
advance the course of human lives. Consequent upon this, several challenges were thrown …
Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment
OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …
processing of the vast amount of IoT data. Although fog computing has the advantages of …
End-to-end image classification and compression with variational autoencoders
The past decade has witnessed the rising dominance of deep learning and artificial
intelligence in a wide range of applications. In particular, the ocean of wireless smartphones …
intelligence in a wide range of applications. In particular, the ocean of wireless smartphones …