A computation offloading method over big data for IoT-enabled cloud-edge computing
The Internet of mobile things is a burgeoning technique that generates, stores and
processes big real-time data to render rich services for mobile users. In order to mitigate …
processes big real-time data to render rich services for mobile users. In order to mitigate …
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Edge computing provides high-class intelligent services and computing capabilities at the
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …
TR‐IDS: Anomaly‐based intrusion detection through text‐convolutional neural network and random forest
As we head towards the IoT (Internet of Things) era, protecting network infrastructures and
information security has become increasingly crucial. In recent years, Anomaly‐Based …
information security has become increasingly crucial. In recent years, Anomaly‐Based …
An IoT-oriented data placement method with privacy preservation in cloud environment
Abstract IoT (Internet of Things) devices generate huge amount of data which require rich
resources for data storage and processing. Cloud computing is one of the most popular …
resources for data storage and processing. Cloud computing is one of the most popular …
[PDF][PDF] Cyber security and privacy issues in industrial internet of things.
NZ Jhanjhi, M Humayun… - … Systems Science & …, 2021 - cdn.techscience.cn
The emergence of industry 4.0 stems from research that has received a great deal of
attention in the last few decades. Consequently, there has been a huge paradigm shift in the …
attention in the last few decades. Consequently, there has been a huge paradigm shift in the …
A real-time correlation of host-level events in cyber range service for smart campus
Smart campus is an exciting, new, and emerging research area that uses technology and
infrastructure to support and improve its processes in campus services, teaching, learning …
infrastructure to support and improve its processes in campus services, teaching, learning …
A heuristic evolutionary algorithm of UAV path planning
With the rapid development of the network and the informatization of society, how to improve
the accuracy of information is an urgent problem to be solved. The existing method is to use …
the accuracy of information is an urgent problem to be solved. The existing method is to use …
An efficient image matching algorithm based on adaptive threshold and RANSAC
H Li, J Qin, X **ang, L Pan, W Ma, NN **ong - Ieee Access, 2018 - ieeexplore.ieee.org
The education plays a more and more important role in disseminating knowledge because
of the explosive growth of knowledge. As one kind of carrier delivering knowledge, image …
of the explosive growth of knowledge. As one kind of carrier delivering knowledge, image …
A lightweight three-factor Anonymous authentication scheme with privacy protection for personalized healthcare applications
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted
lots of attention in both academia and industry due to the sensitiveness of medical system. In …
lots of attention in both academia and industry due to the sensitiveness of medical system. In …
[PDF][PDF] A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment.
Content based image retrieval (CBIR) techniques have been widely deployed in many
applications for seeking the abundant information existed in images. Due to large amounts …
applications for seeking the abundant information existed in images. Due to large amounts …