Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

Trustworthy and Scalable Federated Edge Learning for Future Integrated Positioning, Communication and Computing System: Attacks and Defenses

R Zhang, S Wu, C Jiang, N Gao, X Qiu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The emergence of Integrated Positioning, Communication, and Computing (IPC2)
technology has paved the way for advanced capabilities in physical-digital spatial …

Privacy and security threats on the Internet of Things

S Ziegler, C Crettaz, E Kim, A Skarmeta… - Internet of things security …, 2019 - Springer
Privacy and Security Threats on the Internet of Things | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research …

A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities …

MA Obaidat, S Obeidat, J Holst, A Al Hayajneh… - Computers, 2020 - mdpi.com
The Internet of Things (IoT) has experienced constant growth in the number of devices
deployed and the range of applications in which such devices are used. They vary widely in …

Cybersecurity Hygiene in the Era of Internet of Things (IoT): Best Practices and Challenges

AA Mughal - Applied Research in Artificial Intelligence and Cloud …, 2019 - researchberg.com
The rapid growth of the Internet of Things (IoT) has resulted in an increasing number of
interconnected devices, creating new opportunities for data collection and automation …

AI-enabled secure microservices in edge computing: Opportunities and challenges

F Al-Doghman, N Moustafa, I Khalil… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The paradigm of edge computing has formed an innovative scope within the domain of the
Internet of Things (IoT) through expanding the services of the cloud to the network edge to …

Hardware and embedded security in the context of internet of things

A Kanuparthi, R Karri, S Addepalli - … of the 2013 ACM workshop on …, 2013 - dl.acm.org
Internet of Things (IoT) is the interconnection of a large number of resource-constrained
devices such as sensors, actuators, and nodes that generate large volumes of data which …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …