Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems

J Liu, M Nogueira, J Fernandes… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Machine Learning (ML) models are susceptible to adversarial samples that appear as
normal samples but have some imperceptible noise added to them with the intention of …

Smart applications in edge computing: Overview on authentication and data security

X Li, T Chen, Q Cheng, S Ma… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
As a new computing paradigm, edge computing has appeared in the public field of vision
recently. Owing to its advantages of low delay and fast response, edge computing has …

Intrusion detection in Edge-of-Things computing

AS Almogren - Journal of Parallel and Distributed Computing, 2020 - Elsevier
Abstract Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of
Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to …

[图书][B] New dimensions of information warfare

R Di Pietro, S Raponi, M Caprolu, S Cresci, R Di Pietro… - 2021 - Springer
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …

A novel framework design of network intrusion detection based on machine learning techniques

C Zhang, Y Chen, Y Meng, F Ruan… - Security and …, 2021 - Wiley Online Library
Traditional machine learning‐based intrusion detection often only considers a single
algorithm to identify intrusion data, lack of the flexibility method, low detection rate, no …

Intelligent intrusion detection algorithm based on multi-attack for edge-assisted internet of things

S Shitharth, GB Mohammed, J Ramasamy… - Security and Risk …, 2023 - Springer
The security concerns surrounding edge computing have been in the forefront as the
technology has become increasingly popular. There is a larger need to move computations …

[HTML][HTML] Edge intelligence for network intrusion prevention in IoT ecosystem

M Habiba, MR Islam, SM Muyeen, ABMS Ali - Computers and Electrical …, 2023 - Elsevier
Abstract The Internet of Things (IoT) platform allows physical devices to connect directly to
the internet and upload data continuously. Insecure access makes IoT platforms vulnerable …

Performance improvement of intrusion detection system for detecting attacks on internet of things and edge of things

YK Saheed - Artificial Intelligence for Cloud and Edge Computing, 2022 - Springer
Edge computing (EC) is a computing methodology that is distributed in nature that brings
data storage and computation closer to the place where it is to be used to accelerate …

[HTML][HTML] A novel, low computational complexity, parallel swarm algorithm for application in low-energy devices

Z Długosz, M Rajewski, R Długosz, T Talaśka - Sensors, 2021 - mdpi.com
In this work, we propose a novel metaheuristic algorithm that evolved from a conventional
particle swarm optimization (PSO) algorithm for application in miniaturized devices and …

Microservice pre-deployment based on mobility prediction and service composition in edge

J Deng, B Li, J Wang, Y Zhao - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
As an emerging computing paradigm, mobile edge computing (MEC) is receiving growing
attention. In MEC, user requests on software applications are firstly sent to edge servers for …