When energy trading meets blockchain in electrical power system: The state of the art
With the rapid growth of renewable energy resources, energy trading has been shifting from
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
Vulnerabilities and limitations of MQTT protocol used between IoT devices
D Dinculeană, X Cheng - Applied Sciences, 2019 - mdpi.com
With the proliferation of smart devices capable of communicating over a network using
different protocols, each year more and more successful attacks are recorded against these …
different protocols, each year more and more successful attacks are recorded against these …
CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities
Machine learning (ML) techniques have been widely used in many smart city sectors, where
a huge amount of data is gathered from various (IoT) devices. As a typical ML model …
a huge amount of data is gathered from various (IoT) devices. As a typical ML model …
A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to
enable computing services devices deployed at network edge, aiming to improve the user's …
enable computing services devices deployed at network edge, aiming to improve the user's …
A survey on access control in the age of internet of things
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …
such as social resources and physical resources, are deeply integrated for different …
A distributed deep learning system for web attack detection on edge devices
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …
devices and sensors transmit huge amounts of data to cloud data centers for further …
Block-DEF: A secure digital evidence framework using blockchain
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
An improved deep reinforcement learning routing technique for collision-free VANET
Abstract Vehicular Adhoc Networks (VANETs) is an emerging field that employs a wireless
local area network (WLAN) characterized by an ad-hoc topology. Vehicular Ad Hoc …
local area network (WLAN) characterized by an ad-hoc topology. Vehicular Ad Hoc …