Docker-based intelligent fall detection using edge-fog cloud infrastructure
Health sector is a life critical domain, which requires fast and intelligent decisions. Artificial
intelligence-based monitoring systems can help the elderly people in situations like fall. In e …
intelligence-based monitoring systems can help the elderly people in situations like fall. In e …
Security using blockchain-based otp with the concept of iot publish/subscribe
Modern applications are continually attracting interest in the Internet of Things, transforming
our daily lives and empowering industrial applications. Because contrary to economic and …
our daily lives and empowering industrial applications. Because contrary to economic and …
A lightweight and cost effective edge intelligence architecture based on containerization technology
The integration of Cloud computing and Internet of Things led to rapid growth in the edge
computing field. This would not be achievable without combining the data centers' managing …
computing field. This would not be achievable without combining the data centers' managing …
Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols
FIDO's U2F is a web-authentication mechanism designed to mitigate real-time phishing—an
attack that undermines multi-factor authentication by allowing an attacker to relay second …
attack that undermines multi-factor authentication by allowing an attacker to relay second …
Cost efficient edge intelligence framework using docker containers
The emergence of edge computing has its basis in the integration of the Internet of Things
(IoT) with the Cloud computing. In order to make it possible, management technologies of …
(IoT) with the Cloud computing. In order to make it possible, management technologies of …
Risk-based authentication based on network latency profiling
Impersonation attacks against web authentication servers have been increasing in
complexity over the last decade. Tunnelling services, such as VPNs or proxies, can be for …
complexity over the last decade. Tunnelling services, such as VPNs or proxies, can be for …
Towards sustainable evolution for the TLS public-key infrastructure
T Lee, C Pappas, P Szalachowski… - Proceedings of the 2018 on …, 2018 - dl.acm.org
Motivated by the weaknesses of today's TLS public-key infrastructure (PKI), recent studies
have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one …
have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one …
Location verification assisted by a moving obstacle for wireless sensor networks
D Wu, D Zhu, Y Liu, D Zhao - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
With the rapid development of the Internet of Things, location information becomes
increasingly important for various applications. However, the localization information of …
increasingly important for various applications. However, the localization information of …
Secure client and server geolocation over the Internet
AR Abdou, PC van Oorschot - arXiv preprint arXiv:1906.11288, 2019 - arxiv.org
In this article, we provide a summary of recent efforts towards achieving Internet geolocation
securely,\ie without allowing the entity being geolocated to cheat about its own geographic …
securely,\ie without allowing the entity being geolocated to cheat about its own geographic …
Retrospective IP address geolocation for geography-aware Internet services
D Komosny - Sensors, 2021 - mdpi.com
The paper deals with the locations of IP addresses that were used in the past. This
retrospective geolocation suffers from continuous changes in the Internet space and a …
retrospective geolocation suffers from continuous changes in the Internet space and a …