Docker-based intelligent fall detection using edge-fog cloud infrastructure

V Divya, RL Sri - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Health sector is a life critical domain, which requires fast and intelligent decisions. Artificial
intelligence-based monitoring systems can help the elderly people in situations like fall. In e …

Security using blockchain-based otp with the concept of iot publish/subscribe

D Apriani, VT Devana, AP Sagala… - AIP Conference …, 2023 - pubs.aip.org
Modern applications are continually attracting interest in the Internet of Things, transforming
our daily lives and empowering industrial applications. Because contrary to economic and …

A lightweight and cost effective edge intelligence architecture based on containerization technology

M Al-Rakhami, A Gumaei, M Alsahli, MM Hassan… - World Wide Web, 2020 - Springer
The integration of Cloud computing and Internet of Things led to rapid growth in the edge
computing field. This would not be achievable without combining the data centers' managing …

Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols

E Ulqinaku, H Assal, AR Abdou, S Chiasson… - 30th USENIX Security …, 2021 - usenix.org
FIDO's U2F is a web-authentication mechanism designed to mitigate real-time phishing—an
attack that undermines multi-factor authentication by allowing an attacker to relay second …

Cost efficient edge intelligence framework using docker containers

M Al-Rakhami, M Alsahli, MM Hassan… - 2018 IEEE 16th Intl …, 2018 - ieeexplore.ieee.org
The emergence of edge computing has its basis in the integration of the Internet of Things
(IoT) with the Cloud computing. In order to make it possible, management technologies of …

Risk-based authentication based on network latency profiling

E Rivera, L Tengana, J Solano… - Proceedings of the 13th …, 2020 - dl.acm.org
Impersonation attacks against web authentication servers have been increasing in
complexity over the last decade. Tunnelling services, such as VPNs or proxies, can be for …

Towards sustainable evolution for the TLS public-key infrastructure

T Lee, C Pappas, P Szalachowski… - Proceedings of the 2018 on …, 2018 - dl.acm.org
Motivated by the weaknesses of today's TLS public-key infrastructure (PKI), recent studies
have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one …

Location verification assisted by a moving obstacle for wireless sensor networks

D Wu, D Zhu, Y Liu, D Zhao - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
With the rapid development of the Internet of Things, location information becomes
increasingly important for various applications. However, the localization information of …

Secure client and server geolocation over the Internet

AR Abdou, PC van Oorschot - arXiv preprint arXiv:1906.11288, 2019 - arxiv.org
In this article, we provide a summary of recent efforts towards achieving Internet geolocation
securely,\ie without allowing the entity being geolocated to cheat about its own geographic …

Retrospective IP address geolocation for geography-aware Internet services

D Komosny - Sensors, 2021 - mdpi.com
The paper deals with the locations of IP addresses that were used in the past. This
retrospective geolocation suffers from continuous changes in the Internet space and a …