When energy trading meets blockchain in electrical power system: The state of the art
With the rapid growth of renewable energy resources, energy trading has been shifting from
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
Vulnerabilities and limitations of MQTT protocol used between IoT devices
D Dinculeană, X Cheng - Applied Sciences, 2019 - mdpi.com
With the proliferation of smart devices capable of communicating over a network using
different protocols, each year more and more successful attacks are recorded against these …
different protocols, each year more and more successful attacks are recorded against these …
CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities
Machine learning (ML) techniques have been widely used in many smart city sectors, where
a huge amount of data is gathered from various (IoT) devices. As a typical ML model …
a huge amount of data is gathered from various (IoT) devices. As a typical ML model …
A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to
enable computing services devices deployed at network edge, aiming to improve the user's …
enable computing services devices deployed at network edge, aiming to improve the user's …
A survey on access control in the age of internet of things
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …
such as social resources and physical resources, are deeply integrated for different …
Block-DEF: A secure digital evidence framework using blockchain
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
Vehicular fog computing: Enabling real-time traffic management for smart cities
Fog computing extends the facility of cloud computing from the center to edge networks.
Although fog computing has the advantages of location awareness and low latency, the …
Although fog computing has the advantages of location awareness and low latency, the …
From IoT to 5G I-IoT: The next generation IoT-based intelligent algorithms and 5G technologies
The Internet of Things is a novel paradigm with access to wireless communication systems
and artificial intelligence technologies, which is considered to be applicable to a variety of …
and artificial intelligence technologies, which is considered to be applicable to a variety of …