D Dinculeană, X Cheng - Applied Sciences, 2019 - mdpi.com
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these …
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information, such as social resources and physical resources, are deeply integrated for different …
J Lin, W Yu, N Zhang, X Yang… - IEEE internet of things …, 2017 - ieeexplore.ieee.org
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to enable computing services devices deployed at network edge, aiming to improve the user's …
M Shen, X Tang, L Zhu, X Du… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As a typical ML model …
Z Tian, M Li, M Qiu, Y Sun, S Su - Information Sciences, 2019 - Elsevier
A secure digital evidence system should ensure that evidence cannot be tampered with and that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
Z Ning, J Huang, X Wang - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
Fog computing extends the facility of cloud computing from the center to edge networks. Although fog computing has the advantages of location awareness and low latency, the …
D Wang, D Chen, B Song, N Guizani… - IEEE Communications …, 2018 - ieeexplore.ieee.org
The Internet of Things is a novel paradigm with access to wireless communication systems and artificial intelligence technologies, which is considered to be applicable to a variety of …