Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks

I Khan, A Ghani, SM Saqlain, MU Ashraf… - IEEE …, 2023 - ieeexplore.ieee.org
The recent advancements in cyber technology have facilitated the global electronic sharing
of healthcare data among various healthcare professionals, including clinicians …

Intrusion and ransomware detection system

A El-Kosairy, MA Azer - 2018 1st international conference on …, 2018 - ieeexplore.ieee.org
Attackers and cybercriminals are always in a race to either compromise networks and
servers or embezzle ransoms through ransomware. Intruders must be prevented from such …

Deception as a service: intrusion and ransomware detection system for cloud computing (IRDS4C)

A El-Kosairy, N Abdelbaki - Advances in Computational Intelligence, 2023 - Springer
Cloud computing technology is growing fast. It offers end-users flexibility, ease of use, agility,
and more at a low cost. This expands the attack surface and factors, resulting in more …

Detecting adversarial attacks through decoy training

J Zhang, F Araujo, T Taylor, MP Stoecklin - US Patent 11,501,156, 2022 - Google Patents
Decoy data is generated from regular data. A deep neural network, which has been trained
with the regular data, is trained with the decoy data. The trained deep neural network …

Fog-assisted data security and privacy in healthcare

S Kaushik, A Sinha - Fog Computing for Healthcare 4.0 Environments …, 2021 - Springer
With the advancement in the aging of world's population and increments of people having
chronic diseases, resulted in high demand for expensive medical treatment and care. In this …

Green Computing in Network Security

N Sumalatha, K Baskaran - Artificial Intelligence Techniques …, 2024 - api.taylorfrancis.com
Green computing seeks to decrease the use of hazardous materials, maximize energy
efficiency throughout a product's lifetime, and increase the recycling or biodegradability of …

[PDF][PDF] Approach for Secure Authorized Deduplication using Hybrid Cloud

MBA Malar, ML Shri, M Deepa… - International Journal of …, 2016 - researchgate.net
Now a days Data deduplication is one of important data compression techniques for
eliminating duplicate copies of repeating data, and has been widely used in cloud storage to …

[PDF][PDF] Contemporary Applications of Fog Computing along with Security Problems and Solutions

KS Kumar, KR Chythanya, B Jamalpur, KS Kumar… - J. Study Res …, 2019 - researchgate.net
Fog computing could be a new paradigm that extends the Cloud platform model by
providing computing resources on the sides of a network. It is represented as a cloud-like …

Detecting adversarial attacks through decoy training

J Zhang, F Araujo, T Taylor, MP Stoecklin - US Patent 11,829,879, 2023 - Google Patents
Decoy data is generated from regular data. A deep neural network, which has been trained
with the regular data, is trained with the decoy data. The trained deep neural network …