Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives

D Javaheri, S Gorgin, JA Lee, M Masdari - Information Sciences, 2023 - Elsevier
Nowadays, cybersecurity challenges and their ever-growing complexity are the main
concerns for various information technology-driven organizations and companies. Although …

[PDF][PDF] Cloud computing trends: A literature review

N Taleb, EA Mohamed - Academic Journal of interdisciplinary …, 2020 - researchgate.net
This study is a literature review on cloud computing cloud computing trends as one the
fastest growing technologies in the computer industry and their benefits and opportunities for …

Secure edge of things for smart healthcare surveillance framework

A Alabdulatif, I Khalil, X Yi, M Guizani - IEEE access, 2019 - ieeexplore.ieee.org
The vast development of the Internet of Things (IoT) and cloud-enabled data processing
solutions provide the opportunity to build novel and fascinating smart, connected healthcare …

Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption

MS Rahman, I Khalil, M Atiquzzaman, X Yi - Engineering Applications of …, 2020 - Elsevier
We present a privacy-preserving framework for Artificial Intelligence (AI) enabled
composition for the edge networks. Edge computing is a very promising technology for …

Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation

A Gumaei, R Sammouda, AMS Al-Salman… - Journal of Parallel and …, 2019 - Elsevier
Nowadays, cloud computing has provided enterprises and users with several capabilities to
process and store their data in various cloud data centers. Storing and processing these …

Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform

MS Rahman, I Khalil, A Alabdulatif, X Yi - Knowledge-Based Systems, 2019 - Elsevier
In this paper, we present a privacy-preserving service selection framework for cloud-based
service systems. In the cloud-based service system, a cloud provider selects the best service …

Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing

S Chen, W Susilo, Y Zhang, B Yang, M Zhang - Computer Standards & …, 2023 - Elsevier
Crowdsensing is an emerging data collection paradigm that enables data collected from a
large number of Internet of Things devices to support effective decision-making. Anomaly …

Practical Implications of Green Internet of Things (G-IoT) for Smart Cities

B Seth, S Dalal, N Dahiya - Green Internet of Things for Smart …, 2021 - taylorfrancis.com
Although the abundant benefits of the Internet of Things (IoT) are inspiring our culture, it
ought to be noted that the IoT also devours energy, supports lethal contamination and e …

The social sustainability of smart cities: urban technological innovation, big data management, and the cognitive internet of things

A Androniceanu - Geopolitics, History, and International Relations, 2019 - ceeol.com
This article reviews recent literature concerning the social sustainability of smart cities.
Building my argument by drawing on data collected from Black & Veatch, ESI ThoughtLab …

An efficient federated learning based intrusion detection system using LS2DNN with PBKA based lightweight privacy preservation in cloud server

R Gupta, T Alam - Multimedia Tools and Applications, 2024 - Springer
To execute seamless computing along with information sharing, Cloud Computing (CC)
plays an important role in measurable resource sharing. But, owing to its open and …