Big data analytics for large-scale wireless networks: Challenges and opportunities

HN Dai, RCW Wong, H Wang, Z Zheng… - ACM Computing …, 2019 - dl.acm.org
The wide proliferation of various wireless communication systems and wireless devices has
led to the arrival of big data era in large-scale wireless networks. Big data of large-scale …

Mobile cloud computing models security issues: A systematic review

AS AlAhmad, H Kahtan, YI Alzoubi, O Ali… - Journal of Network and …, 2021 - Elsevier
Mobile cloud computing (MCC) is a trending technology employed in several domains to
overcome the limitations of mobile devices by using cloud capabilities. Communication …

Blockchain-enabled authenticated key agreement scheme for mobile vehicles-assisted precision agricultural iot networks

A Vangala, AK Das, A Mitra, SK Das… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Precision farming has a positive potential in the agricultural industry regarding water
conservation, increased productivity, better development of rural areas, and increased …

Efficient quantum-based security protocols for information sharing and data protection in 5G networks

AA Abd EL-Latif, B Abd-El-Atty… - Future generation …, 2019 - Elsevier
Fifth generation (5G) networks aim at utilizing many promising communication technologies,
such as Cloud Computing, Network Slicing, and Software Defined Networking. Supporting a …

Early detection of the advanced persistent threat attack using performance analysis of deep learning

JH Joloudari, M Haderbadi, A Mashmool… - IEEE …, 2020 - ieeexplore.ieee.org
One of the most common and critical destructive attacks on the victim system is the
advanced persistent threat (APT)-attack. An APT attacker can achieve its hostile goal …

[HTML][HTML] Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

A location-based orientation-aware recommender system using IoT smart devices and Social Networks

S Ojagh, MR Malek, S Saeedi, S Liang - Future Generation Computer …, 2020 - Elsevier
The rapid development of IoT sensors and data provided by Social Networks has
necessitated the fast development of recommender systems as they can be used as a tool to …

Docker-based intelligent fall detection using edge-fog cloud infrastructure

V Divya, RL Sri - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Health sector is a life critical domain, which requires fast and intelligent decisions. Artificial
intelligence-based monitoring systems can help the elderly people in situations like fall. In e …

[HTML][HTML] A novel deep learning stack for APT detection

T Bodström, T Hämäläinen - Applied Sciences, 2019 - mdpi.com
We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat
(APT) attacks. This model is based on a theoretical approach where an APT is observed as …

A lightweight and cost effective edge intelligence architecture based on containerization technology

M Al-Rakhami, A Gumaei, M Alsahli, MM Hassan… - World Wide Web, 2020 - Springer
The integration of Cloud computing and Internet of Things led to rapid growth in the edge
computing field. This would not be achievable without combining the data centers' managing …