Edge and fog computing for IoT: A survey on current research activities & future directions

M Laroui, B Nour, H Moungla, MA Cherif, H Afifi… - Computer …, 2021 - Elsevier
Abstract The Internet of Things (IoT) allows communication between devices, things, and
any digital assets that send and receive data over a network without requiring interaction …

URLLC and eMBB in 5G industrial IoT: A survey

BS Khan, S Jangsher, A Ahmed… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Fifth generation (5G)-industrial Internet of things (IIoT) is the integration of IIoT and a private
5G network. The IIoT is a concept that involves incorporating smart objects, gadgets, and …

A machine learning security framework for iot systems

M Bagaa, T Taleb, JB Bernabe, A Skarmeta - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things security is attracting a growing attention from both academic and industry
communities. Indeed, IoT devices are prone to various security attacks varying from Denial …

An incentive-aware blockchain-based solution for internet of fake media things

Q Chen, G Srivastava, RM Parizi, M Aloqaily… - Information Processing …, 2020 - Elsevier
Abstract The concept of Fake Media or Internet of Fake Media Things (IoFMT) has emerged
in different domains of digital society such as politics, news, and social media. Due to the …

DL‐IDS: a deep learning–based intrusion detection framework for securing IoT

Y Otoum, D Liu, A Nayak - Transactions on Emerging …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) is comprised of numerous devices connected through
wired or wireless networks, including sensors and actuators. Recently, the number of IoT …

[HTML][HTML] Deep learning for pedestrian collective behavior analysis in smart cities: A model of group trajectory outlier detection

A Belhadi, Y Djenouri, G Srivastava, D Djenouri… - Information …, 2021 - Elsevier
This paper introduces a new model to identify collective abnormal human behaviors from
large pedestrian data in smart cities. To accurately solve the problem, several algorithms …

Blockchain-based database in an IoT environment: challenges, opportunities, and analysis

L Tseng, X Yao, S Otoum, M Aloqaily, Y Jararweh - Cluster Computing, 2020 - Springer
As Bitcoin and other cryptocurrencies become widely popular recently, the underlying
concept—Blockchain—gets unprecedented attentions. One popular usage of Blockchain is …

Interference management in 5G and beyond network: Requirements, challenges and future directions

MUA Siddiqui, F Qamar, F Ahmed, QN Nguyen… - IEEE …, 2021 - ieeexplore.ieee.org
In the modern technological world, wireless communication has taken a massive leap from
the conventional communication system to a new radio communication network. The novel …

Lightweight searchable encryption protocol for industrial internet of things

K Zhang, J Long, X Wang, HN Dai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …

Urldeepdetect: A deep learning approach for detecting malicious urls using semantic vector models

S Afzal, M Asim, AR Javed, MO Beg, T Baker - Journal of Network and …, 2021 - Springer
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …