Intelligent fog computing surveillance system for crime and vulnerability identification and tracing

R Rawat, RK Chakrawarti, P Vyas… - International Journal of …, 2023 - igi-global.com
IoT devices generate enormous amounts of data, which deep learning algorithms can learn
from more effectively than shallow learning algorithms. The approach for threat detection …

An SDN perspective IoT-Fog security: A survey

S Javanmardi, M Shojafar, R Mohammadi, M Alazab… - Computer Networks, 2023 - Elsevier
The utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a
notion that solves cloud computing's limitations by offering low latency to IoT network user …

Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor

SM Hezavehi, R Rahmani - Journal of Parallel and Distributed Computing, 2023 - Elsevier
Cloud computing environments are indispensable components of the majority of information
technology organizations and users' lives. Despite multiple benefits of cloud computing …

Machine learning to combat cyberattack: a survey of datasets and challenges

A Prasad, S Chandra - The Journal of Defense Modeling and …, 2023 - journals.sagepub.com
The ever-increasing number of multi-vector cyberattacks has become a concern for all levels
of organizations. Attackers are infecting Internet-enabled devices and exploiting them to …

DDoS attack detection in smart home applications

AV Chandak, NK Ray - Software: Practice and Experience, 2023 - Wiley Online Library
In smart applications, edge nodes are deployed to perform faster computations. Due to the
limited computational capability of edge nodes, collaborative computing is used in which …

A Perspicacious Multi-level Defense System Against DDoS Attacks in Cloud Using Information Metric & Game Theoretical Approach

M Mohan, V Tamizhazhagan, S Balaji - Journal of Network and Systems …, 2023 - Springer
Abstract Distributed Denial of Service (DDoS) attack poses a significant threat to the cloud
environment that can impoverish the resource availability, engage the server busy, and …

Secure and novel authentication model for protecting data centers in fog environment

PC Senthil Mahesh, K Muthumanickam - Wireless Networks, 2023 - Springer
The model of the fog environment for real-time applications has recently become a research
area of intense interest as it offers cloud services instantly to users. Fog computing also …

Blockchain-based IoMT for an intelligent healthcare system using a drop-offs queue

SR Mallick, V Goswami, RK Lenka… - 2023 First …, 2023 - ieeexplore.ieee.org
Integration of Blockchain technology and the Internet of Medical Things (IoMT) in intelligent
healthcare systems to offer decentralised, trustworthy, secure, reliable, and transparent …

Introduction to different computing paradigms: cloud computing, fog computing, and edge computing

SV Shinde, DJ Hemanth, M Elhoseny - Intelligent Edge Computing for …, 2023 - Elsevier
This chapter introduces the different computing paradigms: Cloud computing, fog computing,
and edge computing, with emphasis on edge computing. Each of these paradigms is more …

SACF: An Innovative and Secure Architectural Approach for Cybersecurity using Fog Computing Environments

M Kaur, R Aron, S Seth - 2023 9th International Conference …, 2023 - ieeexplore.ieee.org
The significance of cybersecurity cannot be emphasised in a society that is becoming more
linked. Unprecedented levels of efficiency and convenience have been made possible by …