Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

InFeMo: flexible big data management through a federated cloud system

CL Stergiou, KE Psannis, BB Gupta - ACM Transactions on Internet …, 2021 - dl.acm.org
This paper introduces and describes a novel architecture scenario based on Cloud
Computing and counts on the innovative model of Federated Learning. The proposed model …

A room with an overview: Towards meaningful transparency for the consumer Internet of Things

C Norval, J Singh - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
As our physical environments become ever-more connected, instrumented, and automated,
it can be increasingly difficult for users to understand what is happening within them and …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

Federated distillation and blockchain empowered secure knowledge sharing for internet of medical things

X Zhou, W Huang, W Liang, Z Yan, J Ma, Y Pan… - Information …, 2024 - Elsevier
With the development of Internet of Things (IoT) and Artificial Intelligence (AI) technologies,
smart services have penetrated into every aspect of our daily lives, including the medical …

Practical whole-system provenance capture

T Pasquier, X Han, M Goldstein, T Moyer… - Proceedings of the …, 2017 - dl.acm.org
Data provenance describes how data came to be in its present form. It includes data sources
and the transformations that have been applied to them. Data provenance has many uses …

A model to develop chatbots for assisting the teaching and learning process

S Mendoza, LM Sánchez-Adame, JF Urquiza-Yllescas… - Sensors, 2022 - mdpi.com
Recently, in the commercial and entertainment sectors, we have seen increasing interest in
incorporating chatbots into websites and apps, in order to assist customers and clients. In …

Dataflow management in the internet of things: Sensing, control, and security

D Wei, H Ning, F Shi, Y Wan, J Xu… - Tsinghua Science …, 2021 - ieeexplore.ieee.org
The pervasiveness of the smart Internet of Things (IoTs) enables many electric sensors and
devices to be connected and generates a large amount of dataflow. Compared with …

Towards scalable cluster auditing through grammatical inference over provenance graphs

WU Hassan, L Aguse, N Aguse, A Bates… - Network and Distributed …, 2018 - par.nsf.gov
Investigating the nature of system intrusions in large distributed systems remains a
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …