Securing IOT devices against emerging security threats: Challenges and mitigation techniques

M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023 - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges
due to their relatively simple internal architecture and low-powered hardware warranted by …

Offloading mode hidden for delay sensitive tasks in edge computing networks

G Zhang, J Du - 2024 5th International Seminar on Artificial …, 2024 - ieeexplore.ieee.org
Edge computing has been developed to support local services with lower burden to the core
network. However, privacy issues deteriorate when terminal users enjoy the high-quality …

SCOTT: Scheduling of Comprehensive Objectives for Tasks with Multitargets in Computing Networks

G Zhang, Z Liu, K Wang, X Zang… - … and Mobile Computing, 2022 - Wiley Online Library
Local and customized services are realized with new type computing architecture by utilizing
the spare resources distributed on the helper nodes (HNs) throughout the network. The …

Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment

X Sun, S Li - PeerJ Computer Science, 2023 - peerj.com
Presently, the focus of target detection is shifting towards the integration of information
acquired from multiple sensors. When faced with a vast amount of data from various …

[PDF][PDF] Revisión sistemática de las tecnologías en la seguridad en el trabajo

DK Cantor Nieto, DA Parra Palacios - 2023 - repository.udistrital.edu.co
La seguridad en el trabajo es una área de alto interés para un gran número de
organizaciones en el mundo, debido a que cualquier tipo de lesión y/o accidente laboral …

[引用][C] A method for suppressing disorderly scheduling in multipath transmission scenarios using time delay offset

S Zhu - Research Briefs on Information and Communication …, 2021