Security of IoT application layer: Requirements, threats, and solutions

M Abbasi, M Plaza-Hernández, Y Mezquita - International Symposium on …, 2022 - Springer
Nowadays, communication systems and networks, become an integral part of not only our
everyday life but also even in industry, critical infrastructure, business, etc. Current trends …

Data Science Meets Intelligent Internet of Things

I Ullah, I Ahamd, MS Anwar, Y Tao… - … Systems Using Artificial …, 2024 - taylorfrancis.com
This chapter investigates the revolutionary convergence of data science with the Internet of
Things (IoT). It demonstrates how data science approaches like advanced analytics …

[图书][B] Deep Learning Approaches for Security Threats in IoT Environments

M Abdel-Basset, N Moustafa, H Hawash - 2022 - books.google.com
Deep Learning Approaches for Security Threats in IoT Environments An expert discussion of
the application of deep learning methods in the IoT security environment In Deep Learning …

Security in the internet of things application layer: requirements, threats, and solutions

M Abbasi, M Plaza-Hernández, J Prieto… - IEEE …, 2022 - ieeexplore.ieee.org
Communication systems and networks are evolving as an integral part of not only of our
everyday life but also as a part of the industry, fundamental infrastructures, companies, etc …

Guest editorial: special section on distributed intelligence over Internet of Things

H Chen, J Rodrigues, F Xia… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
N OWADAYS, billions of devices are connected to the In-ternet, enabling Internet of Things
(IoT) systems widely deployed, such as smart city, smart healthcare and intelligent plant, to …

Edge computing for internet of everything: A survey

X Kong, Y Wu, H Wang, F Xia - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
In this era of the Internet of Everything (IoE), edge computing has emerged as the critical
enabling technology to solve a series of issues caused by an increasing amount of …

Intelligent edge computing: Security and privacy challenges

M Mukherjee, R Matam… - IEEE …, 2020 - ieeexplore.ieee.org
Edge computing has already shown its potential benefits to support the delay-sensitive and
computation-intensive service provisioning in the Internet-of-Things-based environments …

Security in edge-assisted Internet of Things: challenges and solutions

SQ Shen, K Zhang, Y Zhou, S Ci - Science China Information Sciences, 2020 - Springer
The flourish of 5th generation wireless systems (5G) network has brought numerous benefits
to the Internet of Things (IoT) with universal connectivity, improved data rate, and decreased …

Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance

SK Sahu, K Mazumdar - Frontiers in Artificial Intelligence, 2024 - frontiersin.org
The rapid proliferation of Internet of Things (IoT) devices across various industries has
revolutionized the way we interact with technology. However, this widespread adoption has …

Machine learning for security at the iot edge-a feasibility study

H Wang, L Barriga, A Vahidi… - 2019 IEEE 16th …, 2019 - ieeexplore.ieee.org
Benefits of edge computing include reduced latency and bandwidth savings, privacy-by-
default and by-design in compliance with new privacy regulations that encourage sharing …