Resource management in a peer to peer cloud network for IoT

A Javadpour, G Wang, S Rezaei - Wireless Personal Communications, 2020 - Springer
Abstract Software-Defined Internet of Things (SDIoT) is defined as merging heterogeneous
objects in a form of interaction among physical and virtual entities. Large scale of data …

Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine

W Wang, X Du, D Shan, R Qin… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Security issues have resulted in severe damage to the cloud computing environment,
adversely affecting the healthy and sustainable development of cloud computing. Intrusion …

Encryption as a Service for IoT: Opportunities, Challenges and Solutions

A Javadpour, F Ja'fari, T Taleb, Y Zhao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …

DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments

A Javadpour, P Pinto, F Ja'fari, W Zhang - Cluster Computing, 2023 - Springer
Abstract Cloud Internet of Things (CIoT) environments, as the essential basis for computing
services, have been subject to abuses and cyber threats. The adversaries constantly search …

A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things

AK Sangaiah, A Javadpour, F Ja'fari, P Pinto… - Cluster …, 2023 - Springer
Cloud computing environments provide users with Internet-based services and one of their
main challenges is security issues. Hence, using Intrusion Detection Systems (IDSs) as a …

Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization

AK Sangaiah, A Javadpour, P Pinto, S Rezaei… - Computer …, 2023 - Elsevier
Cloud computing is a modern technology that has become popular today. A large number of
requests has made it essential to propose a resources allocation framework for arriving …

Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection

MA Rahman, AT Asyhari, OW Wen, H Ajra… - Multimedia Tools and …, 2021 - Springer
The rapid advancement of technologies has enabled businesses to carryout their activities
seamlessly and revolutionised communications across the globe. There is a significant …

CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities

AK Sangaiah, A Javadpour, F Ja'fari, P Pinto… - Microprocessors and …, 2022 - Elsevier
This research aims to represent a novel approach to detect malicious nodes in Ad-hoc On-
demand Distance Vector (AODV) within the next-generation smart cities. Smart city …

Improving load balancing for data-duplication in big data cloud computing networks

A Javadpour, AMH Abadi, S Rezaei, M Zomorodian… - Cluster …, 2022 - Springer
Data transmission and retrieval in a cloud computing environment are usually handled by
storage device providers or physical storage units leased by third parties. Improving network …

Using Markov learning utilization model for resource allocation in cloud of thing network

SM Mirmohseni, C Tang, A Javadpour - Wireless Personal …, 2020 - Springer
The integration of the Internet of Things (IoT) and cloud environment has led to the creation
of Cloud of Things, which has given rise to new challenges in IoT area. In this paper, using …