Adversarial learning techniques for security and privacy preservation: A comprehensive review
In recent years, the use of smart devices has increased exponentially, resulting in massive
amounts of data. To handle this data, effective data storage and management has required …
amounts of data. To handle this data, effective data storage and management has required …
Enhancing a fog-oriented IoT authentication and encryption platform through deep learning-based attack detection
FC dos Santos, F Duarte-Figueiredo, E Robson… - Internet of Things, 2024 - Elsevier
Abstract The term Internet of Things (IoT) refers to a network that connects smart things with
sensors. Healthcare, transportation, and smart cities are some IoT applications. IoT …
sensors. Healthcare, transportation, and smart cities are some IoT applications. IoT …
A secure integrated framework for fog-assisted Internet-of-Things systems
AK Junejo, N Komninos… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Fog-assisted Internet-of-Things (Fog-IoT) systems are deployed in remote and unprotected
environments, making them vulnerable to security, privacy, and trust challenges. Existing …
environments, making them vulnerable to security, privacy, and trust challenges. Existing …
Ids and ips in lpwan (lorawan, sigfox, and nb-iot)
Abstract Information security is of vital importance in any industry. Due to the emergence of
smart devices, the need has only soared. Especially in wireless devices with low …
smart devices, the need has only soared. Especially in wireless devices with low …
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things
M De Donno, X Fafoutis… - Journal of Computer …, 2022 - content.iospress.com
Abstract The Internet of Things (IoT) is evolving our society; however, the growing adoption
of IoT devices in many scenarios brings security and privacy implications. Current security …
of IoT devices in many scenarios brings security and privacy implications. Current security …
Enhancing an Information-Centric Network of Things at the Internet Edge with Trust-Based Access Control
NK Clark - 2022 IEEE 8th World Forum on Internet of Things …, 2022 - ieeexplore.ieee.org
This work expands on our prior work on an architecture and supporting protocols to
efficiently integrate constrained devices into an Information-Centric Network-based Internet …
efficiently integrate constrained devices into an Information-Centric Network-based Internet …
[PDF][PDF] Fábio Coutinho dos Santos
F Duarte-Figueiredo - researchgate.net
Abstract The term Internet of Things (IoT) refers to a network that connects smart things with
sensors. Healthcare, transportation, and smart cities are some IoT applications. IoT …
sensors. Healthcare, transportation, and smart cities are some IoT applications. IoT …
[引用][C] IoTSafe: Detecçao de Ataques Baseada em Redes Neurais Profundas
FC dos Santos, AL dos Santos… - Anais do VII Workshop de …, 2023 - SBC
[引用][C] Scalable Framework for Securing Constrained Edge Devices into an Information-Centric Network of Things
NK Clark - 2022