Cloud multi-factor authentication is a critical security measure that helps strengthen cloud security from unauthorized access and data breaches. Multi-factor authentication verifies …
Unmanned aerial vehicles (UAVs) have become increasingly popular in recent years and are applied in various fields, from commercial and scientific to military and humanitarian …
M Tanveer, SA Chelloug, M Ahmad… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a revolutionary communication technology, enabling the connection of resource-limited devices to the Internet. These devices are …
The Internet of Things (IoT) revolutionizes connectivity, as IoT devices grow exponentially, vulnerabilities emerge, ranging from data breaches to device hijacking. Thus there is the …
The emergence of edge computing has revolutionized the landscape of modern applications, offering remarkable advantages such as low-latency and high-bandwidth …
Abstract Internet of Drones (IoD) has been deployed in numerous military and civilian domains to offer services such as target surveillance, traffic monitoring, disaster handling …
IoT devices and embedded systems are deployed in critical environments, emphasizing attributes like power efficiency and computational capabilities. However, these constraints …
The Mobile crowdsourcing network (MCN) leverages collaborative intelligence to solve complex tasks through group cooperation. It comprises three main components: the end …
Y Li, W Du, L Han, Z Zhang, T Liu - Sensors, 2023 - mdpi.com
There are several unsolved problems in federated learning, such as the security concerns and communication costs associated with it. Differential privacy (DP) offers effective privacy …