In Social Internet of Things (SIoT), devices collaborate to request and provide services. As trust-related attacks can undermine the potential benefits offered by the SIoT, this study …
Fog computing is a decentralised computing infrastructure that brings data, storage, computation, and communication resources closer to end users by extending typical cloud …
Trust Modelling and Management (TMM) techniques are frequently applied in ad-hoc Distributed Wireless Networks (DWNs) to stimulate and improve cooperation between …
Automatic detection of the precise occurrence and duration of an attack reflected in time- series logs generated by cyber-physical systems is a challenging problem. This problem is …
Mobile sensors, such as smart wearables, autonomous cars, cognitive healthcare devices, and intelligent drones, draw great attention due to their ability to provide a wide-range of …
The Internet of Things (IoT) is transforming the world into an ecosystem of objects that communicate with each other to enrich our lives. The devices' collaboration allows the …
A Social Internet of Things (SIoT) network is established when social networking concepts are integrated into the Internet of Things (IoT) paradigm in such a manner that objects are …
The Internet of things (IoT) aims to connect everything and everyone around the world to provide diverse applications that improve quality of life. In this technology, the preservation …
In our evolving society, a future is envisioned where humans and digital systems converge to shape dynamic and unpredictable ecosystems constantly adapting to ever-changing …