Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks

MJ Farooq, Q Zhu - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) relies heavily on wireless communication devices that are able
to discover and interact with other wireless devices in their vicinity. The communication …

Modeling and analyzing the spatial-temporal propagation of malware in mobile wearable IoT networks

J Dou, G Xie, Z Tian, L Cui, S Yu - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Wearable Internet of Things (IoT) devices are easily compromised by malware due to their
security vulnerabilities. The bots infected by malware may continue to infect healthy …

Modeling and analysis botnet propagation in social Internet of Things

H Xia, L Li, X Cheng, X Cheng… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The existence of botnet puts people in an extremely insecure environment, which has
seriously affected the development of Internet of Things (IoT). In order to prevent the …

Source-based defense against DDoS attacks in SDN based on sFlow and SOM

M Wang, Y Lu, J Qin - IEEE Access, 2021 - ieeexplore.ieee.org
In the traditional distributed control network, due to the difficulty in detection and the
ambiguous defense responsibility, it is not efficient and effective to detect Distributed Denial …

Health risks of occupational exposure to toxic chemicals in coal mine workplaces based on risk assessment mathematical model based on deep learning

Z Fan, F Xu - Environmental Technology & Innovation, 2021 - Elsevier
With the increasing demand for energy in China, more and more coal mines are mined. At
the same time, along with the safety and health risks brought by occupational exposure in …

A cloud-assisted malware detection and suppression framework for wireless multimedia system in IoT based on dynamic differential game

W Zhou, B Yu - China Communications, 2018 - ieeexplore.ieee.org
As a novel dynamic network service infrastructure, Internet of Things (IoT) has gained
remarkable popularity with obvious superiorities in the interoperability and real-time …

On security threats of botnets to cyber systems

T Lange, H Kettani - 2019 6th International Conference on …, 2019 - ieeexplore.ieee.org
As the dynamics of cyber warfare continue to change, it is very important to be aware of the
issues currently confronting cyberspace. One threat which continues to grow in the danger it …

Designing security-aware incentives for computation offloading via device-to-device communication

J Xu, L Chen, K Liu, C Shen - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
Computation offloading via device-to-device (D2D) communication, or D2D offloading, can
enhance mobile computing performance by exploiting spare computing resources of nearby …

Modeling, Critical Threshold, and Lowest-Cost Patching Strategy of Malware Propagation in Heterogeneous IoT Networks

X Wang, X Zhang, S Wang, J Xiao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In heterogeneous Internet of Things (IoT) networks, various communication technologies
lead to different transmission ranges of nodes, and they can cooperatively provide seamless …