A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
A review of machine learning algorithms for cloud computing security
Cloud computing (CC) is on-demand accessibility of network resources, especially data
storage and processing power, without special and direct management by the users. CC …
storage and processing power, without special and direct management by the users. CC …
Toward intelligent cyber-physical systems: Digital twin meets artificial intelligence
M Groshev, C Guimarães… - IEEE …, 2021 - ieeexplore.ieee.org
Industry 4.0 aims to support smarter and autonomous processes while improving agility, cost
efficiency, and user experience. To fulfill its promises, properly processing the data of the …
efficiency, and user experience. To fulfill its promises, properly processing the data of the …
Investigating factors influencing individual user's intention to adopt cloud computing: a hybrid approach using PLS-SEM and fsQCA
Purpose The main objective of this study is to investigate the factors that influence the
adoption intention of cloud computing services among individual users using the extended …
adoption intention of cloud computing services among individual users using the extended …
Cloud security threats and solutions: A survey
UA Butt, R Amin, M Mehmood, H Aldabbas… - Wireless Personal …, 2023 - Springer
Cloud computing is the on-demand availability of PC framework resources. Especially
information storage and handling power, without direct unique administration by the …
information storage and handling power, without direct unique administration by the …
Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …
some form of smart device in their homes or workplaces. These devices are often off-the …
Fog computing, cloud computing and IoT environment: advanced broker management system
M Al Masarweh, T Alwada'n, W Afandi - Journal of Sensor and Actuator …, 2022 - mdpi.com
Cloud computing is a massive amount of dynamic ad distributed resources that are
delivered on request to clients over the Internet. Typical centralized cloud computing models …
delivered on request to clients over the Internet. Typical centralized cloud computing models …
Towards the internet of robotic things: Analysis, architecture, components and challenges
The Internet of Things (IoT) and Robotics cannot be considered two separate domains these
days. The Internet of Robotics Things (IoRT) is a concept that has been recently introduced …
days. The Internet of Robotics Things (IoRT) is a concept that has been recently introduced …
Computational intelligence enabled cybersecurity for the internet of things
The computational intelligence (CI) based technologies play key roles in campaigning
cybersecurity challenges in complex systems such as the Internet of Things (IoT), cyber …
cybersecurity challenges in complex systems such as the Internet of Things (IoT), cyber …
Cloud of Things: architecture, applications and challenges
Abstract Nowadays, Cloud Computing and Internet of Things (IoT) are amongst the most
emerging internet technologies playing a vital role in our daily lives. In the near future, their …
emerging internet technologies playing a vital role in our daily lives. In the near future, their …