Cyber security meets artificial intelligence: a survey

J Li - Frontiers of Information Technology & Electronic …, 2018 - Springer
There is a wide range of interdisciplinary intersections between cyber security and artificial
intelligence (AI). On one hand, AI technologies, such as deep learning, can be introduced …

[HTML][HTML] Fog computing: An overview of big IoT data analytics

MR Anawar, S Wang, M Azam Zia… - … and Mobile Computing, 2018 - hindawi.com
A huge amount of data, generated by Internet of Things (IoT), is growing up exponentially
based on nonstop operational states. Those IoT devices are generating an avalanche of …

Adaptive transmission control for software defined vehicular networks

W Quan, N Cheng, M Qin, H Zhang… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
Efficient transmission control is an intricate issue in vehicular networks due to the inherent
topology dynamics and unreliable link conditions. Leveraging flexible management in …

NLES: A novel lifetime extension scheme for safety-critical cyber-physical systems using SDN and NFV

J Wu, S Luo, S Wang, H Wang - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
The cyber-physical system (CPS) is a promising technique that enables a safety-critical
industry ecosystem. In general, wireless sensor networks (WSNs) and the Internet of Things …

Information-centric networking with edge computing for IoT: Research challenges and future directions

R Ullah, SH Ahmed, BS Kim - IEEE Access, 2018 - ieeexplore.ieee.org
Cloud computing is a paradigm that offers storage, computation, and software services on
demand in the Cloud and far from end users. These services and computations are then …

Deep reinforcement learning based smart mitigation of DDoS flooding in software-defined networks

Y Liu, M Dong, K Ota, J Li, J Wu - 2018 IEEE 23rd international …, 2018 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) flooding attack has remained as one of the most
destructive attacks for more than two decades. Although great efforts have been made to …

Scientific workflow execution system based on mimic defense in the cloud environment

Y Wang, J Wu, Y Guo, H Hu, W Liu, G Cheng - Frontiers of Information …, 2018 - Springer
With more large-scale scientific computing tasks being delivered to cloud computing
platforms, cloud workflow systems are designed for managing and arranging these …

Fraud detection within bankcard enrollment on mobile device based payment using machine learning

H Zhou, H Chai, M Qiu - Frontiers of Information Technology & Electronic …, 2018 - Springer
The rapid growth of mobile Internet technologies has induced a dramatic increase in mobile
payments as well as concomitant mobile transaction fraud. As the first step of mobile …

SIoTFog: Byzantine-resilient IoT fog networking

J Xu, K Ota, M Dong, A Liu, Q Li - Frontiers of information technology & …, 2018 - Springer
The current boom in the Internet of Things (IoT) is changing daily life in many ways, from
wearable devices to connected vehicles and smart cities. We used to regard fog computing …

QoS-predicted energy efficient routing for information-centric smart grid: A network calculus approach

K Wang, J Li, J Wu, G Li - IEEE Access, 2018 - ieeexplore.ieee.org
As the proportion of information content in the power grid increased, information-centric
smart grid (iCenS) has drawn much attention in recent years. By introducing features of …