A comprehensive survey on smartnics: Architectures, development models, applications, and research directions

EF Kfoury, S Choueiri, A Mazloum, A AlSabeh… - IEEE …, 2024 - ieeexplore.ieee.org
The end of Moore's Law and Dennard Scaling has slowed processor improvements in the
past decade. While multi-core processors have improved performance, they are limited by …

A survey of DDoS attack detection techniques for IoT systems using Blockchain technology

ZA Khan, AS Namin - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) is a network of sensors that helps collect data 24/7 without
human intervention. However, the network may suffer from problems such as the low battery …

CIA-CVD: cloud based image analysis for COVID-19 vaccination distribution

VK Prasad, D Dansana, SGK Patro, AO Salau… - Journal of Cloud …, 2023 - Springer
Due to the huge impact of COVID-19, the world is currently facing a medical emergency and
shortage of vaccine. Many countries do not have enough medical equipment and …

Towards double defense network security based on multi-identifier network architecture

Y Wang, A Smahi, H Zhang, H Li - Sensors, 2022 - mdpi.com
Recently, more and more mobile devices have been connected to the Internet. The Internet
environment is complicated, and network security incidents emerge endlessly. Traditional …

PatchesNet: PatchTST-based multi-scale network security situation prediction

H Yi, S Zhang, D An, Z Liu - Knowledge-Based Systems, 2024 - Elsevier
Abstract Internet of Things (IoT) technology increases connectivity between devices;
however, IoT device networks are less secure, making them highly susceptible to attack …

How to dissolve the “privacy paradox” in social networks? A game approach based on privacy calculus

X Zhang, Y Cai, F Liu, F Zhou - Kybernetes, 2024 - emerald.com
Purpose This paper aims to propose a solution for dissolving the “privacy paradox” in social
networks, and explore the feasibility of adopting a synergistic mechanism of “deep-learning …

A Scalable Security Approach in IoT Networks: Smart Contracts and Anomaly-based IDS for Gateways using Hardware Accelerators

DM Ngo, D Lightbody, A Temko, CC Murphy… - IEEE …, 2024 - ieeexplore.ieee.org
With the widespread integration of new technologies, IoT devices are becoming increasingly
diverse and capable of handling highly complex tasks, compared to previous generations …

Snapshot for Power Grids IoT: Adaptive Measurement for Resilience Intelligent Internet of Things

Y Zhao, G Cheng, C Liu, Z Chen… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the wide application of Internet of Things (IoT) devices in the power grids, the
sophisticated feedback on their operating status is of great significance for improving …

An IoT Security Risk Assessment Framework for Healthcare Environment

M Waqdan, H Louafi, M Mouhoub - … Symposium on Networks …, 2023 - ieeexplore.ieee.org
Risk Assessment for IoT is important for analyzing the risks associated with deploying and
using IoT technologies. A risk assessment framework helps organizations identify, assess …

Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach

SM Hasan, AM Alotaibi, S Talukder… - arXiv preprint arXiv …, 2024 - arxiv.org
With the proliferation of edge devices, there is a significant increase in attack surface on
these devices. The decentralized deployment of threat intelligence on edge devices …