R Soltani, M Zaman, R Joshi, S Sampalli - Applied Sciences, 2022 - mdpi.com
With the success of Bitcoin and the introduction of different uses of Blockchain, such as smart contracts in Ethereum, many researchers and industries have turned their attention to …
Over the past five years, interest in the literature regarding the security of the Internet of Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …
S Akbulut, FH Semantha, S Azam, ICA Pilares… - Sensors, 2023 - mdpi.com
The privacy and security of patients' health records have been an ongoing issue, and researchers are in a race against technology to design a system that can help stop the …
Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom …
Resource constraint Consumer Internet of Things (CIoT) is controlled through gateway devices (eg, smartphones, computers, etc.) that are connected to Mobile Edge Computing …
Applying peer-to-peer (P2P) architecture to online video games has already attracted both academic and industrial interests, since it removes the need for expensive server …
M Femminella, G Reali - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
The service function (SF) area has gained increasing attention in the last years due its ability to combine the advantages of cloud computing with network softwarization. By decoupling …
Z Ren, X Li, Y Miao, Z Li, Z Wang, M Zhu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (UAV-MEC) has been proposed to offer computing resources for smart devices and user equipment. UAV cluster …
T Shen, Q Sun, C Zhang, F Bai - Cluster Computing, 2024 - Springer
Blockchain technology has been increasingly integrated into various fields of economic and social development. However, scalability issues such as low broadcast efficiency, high …