Leveraging the usage of blockchain toward trust-dominated manufacturing systems
Smart manufacturing has transformed the role of data in manufacturing, with a significant
focus on secure data infrastructure. As factories engage with external data sources …
focus on secure data infrastructure. As factories engage with external data sources …
Centrality-Based On-Path Caching Strategies in NDN-Based Internet of Things: A Survey
The substantial growth in data volume has led to considerable technological obstacles on
the Internet. In order to address the high volume of Internet traffic, the research community …
the Internet. In order to address the high volume of Internet traffic, the research community …
The Eternal Tussle: Exploring the Role of Centralization in {IPFS}
Web centralization and consolidation has created potential single points of failure, eg, in
areas such as content hosting, name resolution, and certification. The" Decentralized Web" …
areas such as content hosting, name resolution, and certification. The" Decentralized Web" …
[HTML][HTML] Blockchain-based model for incentivized cyber threat intelligence sharing
Sharing cyber threat intelligence (CTI) can significantly improve the security of information
technology (IT) in organizations. However, stakeholders and practitioners are not keen on …
technology (IT) in organizations. However, stakeholders and practitioners are not keen on …
Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures
Blockchain technology transformed the digital sphere by providing a transparent, secure,
and decentralized platform for data security across a range of industries, including …
and decentralized platform for data security across a range of industries, including …
Tit-for-Token: fair rewards for moving data in decentralized storage networks
Centralized data silos are not only becoming prohibitively expensive but also raise issues of
data ownership and data availability. These developments are affecting the industry …
data ownership and data availability. These developments are affecting the industry …
A comprehensive survey on machine learning techniques in opportunistic networks: Advances, challenges and future directions
Abstract Machine Learning (ML) is growing in popularity and is applied in numerous fields to
solve complex problems. Opportunistic Networks are a type of Ad-hoc Network where a …
solve complex problems. Opportunistic Networks are a type of Ad-hoc Network where a …
StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks
Network path validation aims to give more control over the forwarding path of data packets in
a path-aware network, which shields the network from security threats and allows end hosts …
a path-aware network, which shields the network from security threats and allows end hosts …
Blockchain-enabled auction for cloud resource provisioning: a survey on trust and economy
Blockchain has become a game-changing technology in the dynamic world of technological
breakthroughs, offering a variety of benefits to enterprises. The blockchain-enabled auction …
breakthroughs, offering a variety of benefits to enterprises. The blockchain-enabled auction …
Incentive Mechanism for Resource Trading in Video Analytic Services Using Reinforcement Learning
Video analytics play a pivotal role in enhancing the safety of intelligent surveillance and
autonomous driving. However, the transmission of vast video data and the computational …
autonomous driving. However, the transmission of vast video data and the computational …