Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives
Nowadays, cybersecurity challenges and their ever-growing complexity are the main
concerns for various information technology-driven organizations and companies. Although …
concerns for various information technology-driven organizations and companies. Although …
[PDF][PDF] Cloud computing trends: A literature review
This study is a literature review on cloud computing cloud computing trends as one the
fastest growing technologies in the computer industry and their benefits and opportunities for …
fastest growing technologies in the computer industry and their benefits and opportunities for …
Secure edge of things for smart healthcare surveillance framework
The vast development of the Internet of Things (IoT) and cloud-enabled data processing
solutions provide the opportunity to build novel and fascinating smart, connected healthcare …
solutions provide the opportunity to build novel and fascinating smart, connected healthcare …
Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption
We present a privacy-preserving framework for Artificial Intelligence (AI) enabled
composition for the edge networks. Edge computing is a very promising technology for …
composition for the edge networks. Edge computing is a very promising technology for …
Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation
Nowadays, cloud computing has provided enterprises and users with several capabilities to
process and store their data in various cloud data centers. Storing and processing these …
process and store their data in various cloud data centers. Storing and processing these …
Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform
In this paper, we present a privacy-preserving service selection framework for cloud-based
service systems. In the cloud-based service system, a cloud provider selects the best service …
service systems. In the cloud-based service system, a cloud provider selects the best service …
EVAD: encrypted vibrational anomaly detection with homomorphic encryption
One of the main concerns of cloud-based services based on machine and deep learning
algorithms is the privacy of users' data. This is particularly relevant when companies want to …
algorithms is the privacy of users' data. This is particularly relevant when companies want to …
The social sustainability of smart cities: urban technological innovation, big data management, and the cognitive internet of things
A Androniceanu - Geopolitics, History, and International Relations, 2019 - ceeol.com
This article reviews recent literature concerning the social sustainability of smart cities.
Building my argument by drawing on data collected from Black & Veatch, ESI ThoughtLab …
Building my argument by drawing on data collected from Black & Veatch, ESI ThoughtLab …
An efficient federated learning based intrusion detection system using LS2DNN with PBKA based lightweight privacy preservation in cloud server
To execute seamless computing along with information sharing, Cloud Computing (CC)
plays an important role in measurable resource sharing. But, owing to its open and …
plays an important role in measurable resource sharing. But, owing to its open and …
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing
Crowdsensing is an emerging data collection paradigm that enables data collected from a
large number of Internet of Things devices to support effective decision-making. Anomaly …
large number of Internet of Things devices to support effective decision-making. Anomaly …