With the rapid growth of renewable energy resources, energy trading has been shifting from the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
Z Tian, C Luo, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further …
Z Tian, M Li, M Qiu, Y Sun, S Su - Information Sciences, 2019 - Elsevier
A secure digital evidence system should ensure that evidence cannot be tampered with and that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
Edge computing provides high-class intelligent services and computing capabilities at the edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …
Z Tian, X Gao, S Su, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Conducting reputation management is very important for Internet of vehicles. However, most of the existing work evaluate the effectiveness of their schemes with settled attacking …
J Gu, B Sun, X Du, J Wang, Y Zhuang, Z Wang - IEEE Access, 2018 - ieeexplore.ieee.org
To address the problem of detecting malicious codes in malware and extracting the corresponding evidences in mobile devices, we construct a consortium blockchain …
Simulating the BGP routing system of Internet is crucial to the analysis of Internet backbone network routing behavior, locating network failure and, evaluating network performance for …