Outlier detection: Methods, models, and classification

A Boukerche, L Zheng, O Alfandi - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Over the past decade, we have witnessed an enormous amount of research effort dedicated
to the design of efficient outlier detection techniques while taking into consideration …

Design of cognitive fog computing for intrusion detection in Internet of Things

S Prabavathy, K Sundarakantham… - Journal of …, 2018 - ieeexplore.ieee.org
Internet of things (IoT) is penetrating into every aspect of our lives including our body, our
home and our living environment along with numerous security challenges. With rapidly …

Incentive mechanism for computation offloading using edge computing: A Stackelberg game approach

Y Liu, C Xu, Y Zhan, Z Liu, J Guan, H Zhang - Computer Networks, 2017 - Elsevier
IoT-based services benefit from cloud which offers a virtually unlimited capabilities, such as
storage, processing, and communication. However, the challenges are still open for mobile …

Energy efficiency in security of 5G-based IoT: An end-to-end adaptive approach

H Hellaoui, M Koudil… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The challenging problem of energy efficiency in security of the Internet of Things (IoT) is
tackled in this article. The authors consider the upcoming generation of mobile networks, 5G …

Privacy preserving and data publication for vehicular trajectories with differential privacy

M Arif, J Chen, G Wang, O Geman, VE Balas - Measurement, 2021 - Elsevier
Abstract In the Vehicular Ad-hoc Networks, an enormous number of Location-based
Services could be given to clients as per their development characteristics. Then, protection …

An algorithmic approach for core election in mobile ad-hoc network

F Khan, AW Khan, K Shah, I Qasim… - Journal of Internet …, 2019 - jit.ndhu.edu.tw
Multicasting has an important contribution in a wireless sensor network. Through
multicasting, multiple copies of data at the same time in a single transmission can be …

GRBC-based network security functions placement scheme in SDS for 5G security

J Guan, Z Wei, I You - Journal of Network and Computer Applications, 2018 - Elsevier
With the paradigm shift of 5G in terms of computing and infrastructure, 5G security is
confronted with new challenges due to the promising introduction of Software Defined …

Knowledge connectivity vs. synchrony requirements for fault-tolerant agreement in unknown networks

F Greve, S Tixeuil - 37th Annual IEEE/IFIP International …, 2007 - ieeexplore.ieee.org
In self-organizing systems, such as mobile ad-hoc and peer-to-peer networks, consensus is
a fundamental building block to solve agreement problems. It contributes to coordinate …

Rendezvous: Opportunistic data delivery to mobile users by UAVs through target trajectory prediction

JY Yoon, AH Lee, HJ Lee - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
Reliable and timely delivery of data to mobile targets is a challenging problem in mobile ad-
hoc networks, because of the opportunistic and unpredictable nature of the problem. Finding …

Participant selection for data collection through device-to-device communications in mobile sensing

Y Wang, H Li, T Li - Personal and Ubiquitous Computing, 2017 - Springer
The appearance of smart mobile devices with communication, computation and sensing
capability and increasing popularity of various mobile applications have caused the …