Resource management in a peer to peer cloud network for IoT

A Javadpour, G Wang, S Rezaei - Wireless Personal Communications, 2020 - Springer
Abstract Software-Defined Internet of Things (SDIoT) is defined as merging heterogeneous
objects in a form of interaction among physical and virtual entities. Large scale of data …

[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine

W Wang, X Du, D Shan, R Qin… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Security issues have resulted in severe damage to the cloud computing environment,
adversely affecting the healthy and sustainable development of cloud computing. Intrusion …

DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments

A Javadpour, P Pinto, F Ja'fari, W Zhang - Cluster Computing, 2023 - Springer
Abstract Cloud Internet of Things (CIoT) environments, as the essential basis for computing
services, have been subject to abuses and cyber threats. The adversaries constantly search …

A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things

AK Sangaiah, A Javadpour, F Ja'fari, P Pinto… - Cluster …, 2023 - Springer
Cloud computing environments provide users with Internet-based services and one of their
main challenges is security issues. Hence, using Intrusion Detection Systems (IDSs) as a …

Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization

AK Sangaiah, A Javadpour, P Pinto, S Rezaei… - Computer …, 2023 - Elsevier
Cloud computing is a modern technology that has become popular today. A large number of
requests has made it essential to propose a resources allocation framework for arriving …

Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection

MA Rahman, AT Asyhari, OW Wen, H Ajra… - Multimedia Tools and …, 2021 - Springer
The rapid advancement of technologies has enabled businesses to carryout their activities
seamlessly and revolutionised communications across the globe. There is a significant …

CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities

AK Sangaiah, A Javadpour, F Ja'fari, P Pinto… - Microprocessors and …, 2022 - Elsevier
This research aims to represent a novel approach to detect malicious nodes in Ad-hoc On-
demand Distance Vector (AODV) within the next-generation smart cities. Smart city …

Towards data security assessments using an IDS security model for cyber-physical smart cities

AK Sangaiah, A Javadpour, P Pinto - Information Sciences, 2023 - Elsevier
Technology has enabled many devices to exchange huge amounts of data and
communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid …

Improving load balancing for data-duplication in big data cloud computing networks

A Javadpour, AMH Abadi, S Rezaei, M Zomorodian… - Cluster …, 2022 - Springer
Data transmission and retrieval in a cloud computing environment are usually handled by
storage device providers or physical storage units leased by third parties. Improving network …