过去一年中添加的文章,按日期排序

Developing scalable data solutions for small and medium enterprises: Challenges and best practices

E Johnson, OB Seyi-Lande, GS Adeleke… - International Journal of …, 2024 - fepbl.com
14 天前 - … , such as artificial intelligence, machine learning, edge computing, and multi-cloud
strategies, to … Keep software and systems updated with the latest security patches to mitigate …

[HTML][HTML] A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research …

NN Josbert, M Wei, W Ping, A Rafiq - … of King Saud University-Computer …, 2024 - Elsevier
25 天前 - … SDN controllers by the literature review and identifies the … of the AI/ML algorithms
in IIoT and different technologies … investigation of network security approaches provided by …

Holistic Artificial Intelligence: A Survey

JL FENG - Journal of Beijing University of Posts and … - journal.bupt.edu.cn
29 天前 - … more research on secure and trustworthy technologies in large-… article will review
the framework of Holistic Artificial Intelligence, … in the direction of Holistic Artificial Intelligence. …

Security and Privacy-Preserving Techniques of Federated Learning in Edge Computing: A Comparative Study

N Aasoum, I Jellouli, S Amjad… - 2024 4th International …, 2024 - ieeexplore.ieee.org
42 天前 - … has to meet the everincreasing demands of artificial intelligence applications in …
AI application in automotive edge computing, the diversity of image quality and compute

A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques …

W Hu, Q Cao, M Darbandi, N Jafari Navimipour - Cluster Computing, 2024 - Springer
62 天前 - … As these algorithms have a high success rate in security and privacy [56, 57], we
have … This process yielded about 145 articles included in this systematic review. To review the …

Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm

R Agrawal, S Singhal, A Sharma - Cluster Computing, 2024 - Springer
82 天前 - … The objective of this study is to develop a blockchain and fog computing model that
implements secure data access control … The literature review was described in Sect. 2, the …

A Comprehensive Survey of Digital Twins: Applications, Technologies and Security Challenges

SR Jeremiah, A El Azzaoui, NN Xiong… - Journal of Systems …, 2024 - Elsevier
92 天前 - … Alongside advancements in Artificial Intelligence (AI), significant progress has
been … and security, there is a lack of systematic review of the DT security literature across …

[图书][B] Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection

S Mahajan, M Khurana, VV Estrela - 2024 - books.google.com
107 天前 - … This book builds upon the existing body of literature that explores the integration
of AI … passionate about securing our digital world. The fusion of AI and cybersecurity has the …

[图书][B] Edge Computational Intelligence for AI-Enabled IoT Systems

S Kulkarni, J Dwivedi, D Pramanta, Y Tanaka - 2024 - books.google.com
122 天前 - secured with the help of AI in edge computing. Chapter 3 deliberates on
computational-based edge AI … covers AI and soft computing-driven evolutionary computation

Edge Computing Empowered Smart Healthcare: Monitoring and Diagnosis with Deep Learning Methods

K Wang, S Kong, X Chen, M Zhao - Journal of Grid Computing, 2024 - Springer
127 天前 - security and privacy-related issues in this highly unpredictable ecosystem. This study
[22] aims to develop a cost-effective and efficient AI… of existing systematic reviews and meta…