Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems
The communication and networking field is hungry for machine learning decision-making
solutions to replace the traditional model-driven approaches that proved to be not rich …
solutions to replace the traditional model-driven approaches that proved to be not rich …
Understanding the challenges and novel architectural models of multi-cloud native applications–a systematic literature review
Abstract The evolution of Cloud Computing into a service utility, along with the pervasive
adoption of the IoT paradigm, has promoted a significant growth in the need of …
adoption of the IoT paradigm, has promoted a significant growth in the need of …
A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions
In the past several years, the world has witnessed an acute surge in the production and
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things
As an enabler for smart industrial Internet of Things (IoT), sensor cloud facilitates data
collection, processing, analysis, storage, and sharing on demand. However, compromised …
collection, processing, analysis, storage, and sharing on demand. However, compromised …
Game theory and reinforcement learning based secure edge caching in mobile social networks
Edge caching has become one of promising technologies in mobile social networks (MSNs)
to proximally provide popular contents for mobile users. However, since caching contents …
to proximally provide popular contents for mobile users. However, since caching contents …
FoGMatch: An intelligent multi-criteria IoT-fog scheduling approach using game theory
Cloud computing has long been the main backbone that Internet of Things (IoT) devices rely
on to accommodate their storage and analytical needs. However, the fact that cloud systems …
on to accommodate their storage and analytical needs. However, the fact that cloud systems …
Optimal load distribution for the detection of VM-based DDoS attacks in the cloud
Distributed Denial of Service (DDoS) constitutes a major threat against cloud systems owing
to the large financial losses it incurs. This motivated the security research community to …
to the large financial losses it incurs. This motivated the security research community to …
[HTML][HTML] A novel model based collaborative filtering recommender system via truncated ULV decomposition
Collaborative filtering is a technique that takes into account the common characteristics of
users and items in recommender systems. Matrix decompositions are one of the most used …
users and items in recommender systems. Matrix decompositions are one of the most used …
Stimulating trust cooperation in edge services: An evolutionary tripartite game
Network edge services have contributed to ordinary people's daily lives with numerous
conveniences but the accompanying problems, such as counterfeiting, the trust crisis and …
conveniences but the accompanying problems, such as counterfeiting, the trust crisis and …
Formal verification of group and propagated trust in multi-agent systems
While modeling trust in multi-agent systems provides a fundamental basis for promoting safe
interactions and imitating agents reasoning mechanisms, exploiting model checking …
interactions and imitating agents reasoning mechanisms, exploiting model checking …