Z Wang, W Xie, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate computing, communication, and control. Malicious attacks on CPSs can lead to both …
LB Bhajantri - Journal of Telecommunications and Information …, 2020 - bibliotekanauki.pl
Efficient resource management is a challenging task in distributed systems, such as the Internet of Things, fog, edge, and cloud computing. In this work, we present a broad …
In the past few years, the term Internet of Things (IoT) has become very prevalent. In IoT, aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint …
M Chehab, A Mourad - IEEE Transactions on Dependable and …, 2020 - ieeexplore.ieee.org
The broad applicability of Internet of Things (IoT) would truly enable the pervasiveness of smart devices for sensing data. In this context, achieving service personalization requires …
Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised by attackers, because strong security protections may not be suitable to be deployed. This …
The advent of Intelligent Transport Systems (ITS) has led to the appearance of vehicles increasingly connected to their environment on global road networks. Due to the strict …
A Rullo, D Midi, A Mudjerikar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The wide variety of application domains makes the Internet of Things (IoT) quite unique among other types of computer networks: IoT networks can be made of devices of different …
The integrity of the content a user is exposed to when browsing the web relies on a plethora of non-web technologies and an infrastructure of interdependent hosts, communication …
YJ Deng, YQ Li, YH Qin, MR Dong, B Liu - Chaos, Solitons & Fractals, 2020 - Elsevier
To solve the unreasonable allocation problem of network security defense resource, this paper presents a framework for optimal defense resource allocation for minimizing the …