Orchestration in fog computing: A comprehensive survey

B Costa, J Bachiega Jr, LR De Carvalho… - ACM Computing …, 2022 - dl.acm.org
Fog computing is a paradigm that brings computational resources and services to the
network edge in the vicinity of user devices, lowering latency and connecting with cloud …

An energy-optimized embedded load balancing using DVFS computing in cloud data centers

A Javadpour, AK Sangaiah, P Pinto, F Ja'fari… - Computer …, 2023 - Elsevier
Task scheduling is a significant challenge in the cloud environment as it affects the network's
performance regarding the workload of the cloud machines. It also directly impacts the …

Encryption as a service for IoT: opportunities, challenges and solutions

A Javadpour, F Ja'fari, T Taleb, Y Zhao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …

SALA-IoT: Self-reduced internet of things with learning automaton sleep scheduling algorithm

AK Sangaiah, A Javadpour, F Ja'fari… - IEEE Sensors …, 2023 - ieeexplore.ieee.org
The extensive development of wireless communications has led to the popularity of self-
powered Internet-of-Things (SPIoT) networks. Even though significant advances made in …

DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments

A Javadpour, P Pinto, F Ja'fari, W Zhang - Cluster Computing, 2023 - Springer
Abstract Cloud Internet of Things (CIoT) environments, as the essential basis for computing
services, have been subject to abuses and cyber threats. The adversaries constantly search …

A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things

AK Sangaiah, A Javadpour, F Ja'fari, P Pinto… - Cluster …, 2023 - Springer
Cloud computing environments provide users with Internet-based services and one of their
main challenges is security issues. Hence, using Intrusion Detection Systems (IDSs) as a …

Energy-aware geographic routing for real-time workforce monitoring in industrial informatics

AK Sangaiah, AS Rostami… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Workforce monitoring is a vital activity in large factories in order to oversee the worker's
concentration on their duty and increase productivity. Workforces are kind of moving targets …

Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization

AK Sangaiah, A Javadpour, P Pinto, S Rezaei… - Computer …, 2023 - Elsevier
Cloud computing is a modern technology that has become popular today. A large number of
requests has made it essential to propose a resources allocation framework for arriving …

cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking

A Javadpour, G Wang - The Journal of Supercomputing, 2022 - Springer
Network simulation and capabilities in the form of a logical network has increased the
development of virtual networks rapidly. It is one of the best ways to increase productivity …

BFIM: Performance measurement of a blockchain based hierarchical tree layered fog-IoT microservice architecture

M Whaiduzzaman, MJN Mahi, A Barros, MI Khalil… - IEEE …, 2021 - ieeexplore.ieee.org
Fog computing complements cloud computing by removing several limitations, such as
delays and network bandwidth. It emerged to support Internet of Things (IoT) applications …