Securing IoT networks using formal behavioral modeling and dynamic flow management

A Hamza, M Ayyoob - 2020 - unsworks.unsw.edu.au
dc. description. abstract Widespread use of heterogeneous Internet of Things (IoT) devices
has led to an escalation in sophisticated cyber-attacks, putting private data, personal safety …

Securing Digital Evidence with Blockchain

IBS Siaam, N Mahmud, AR Titas - 2022 - 103.82.172.44
Blockchain, is a tamper-proof secure data storage technology that can be effectively used to
solve a multitude of privacy, security and data integrity problems. In our particular attempt of …

A New Edge-Enabled Distributed Multi-Task Learning Method for a Large-Scale IoT Deployment

SI Hamdan - 2021 - search.proquest.com
Abstract Internets of Things (IoT) devices and applications have become increasingly
important in many societies in recent years. However, the number of IoT devices are …

The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability

J Noor, A Ali-Eldin, L Garcia, C Rao… - MILCOM 2019-2019 …, 2019 - ieeexplore.ieee.org
Autonomic resource management for distributed edge computing systems provides an
effective means of enabling dynamic placement and adaptation in the face of network …

[PDF][PDF] Software Architectural Styles in the Internet of Things

M Jayapal, VSG Akula - 2019 - academia.edu
Internet of Things (IoT) is a developing and testing field for analysts. IoT is a system of
general objects which are embedded with technologies that communicate and interface …