Edge and fog computing for IoT: A survey on current research activities & future directions
Abstract The Internet of Things (IoT) allows communication between devices, things, and
any digital assets that send and receive data over a network without requiring interaction …
any digital assets that send and receive data over a network without requiring interaction …
A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet
Sending data to the cloud for analysis was a prominent trend during the past decades,
driving cloud computing as a dominant computing paradigm. However, the dramatically …
driving cloud computing as a dominant computing paradigm. However, the dramatically …
Distributed attack detection scheme using deep learning approach for Internet of Things
Cybersecurity continues to be a serious issue for any sector in the cyberspace as the
number of security breaches is increasing from time to time. It is known that thousands of …
number of security breaches is increasing from time to time. It is known that thousands of …
Deep learning: The frontier for distributed attack detection in fog-to-things computing
A Abeshu, N Chilamkurti - IEEE Communications Magazine, 2018 - ieeexplore.ieee.org
The increase in the number and diversity of smart objects has raised substantial
cybersecurity challenges due to the recent exponential rise in the occurrence and …
cybersecurity challenges due to the recent exponential rise in the occurrence and …
The security of big data in fog-enabled IoT applications including blockchain: A survey
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
Leveraging LSTM networks for attack detection in fog-to-things communications
The evolution and sophistication of cyber-attacks need resilient and evolving cybersecurity
schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and …
schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and …
[HTML][HTML] Security in product lifecycle of IoT devices: A survey
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …
challenges, which has lately demanded substantial consideration. Accordingly, certain …
Towards low-latency service delivery in a continuum of virtual resources: State-of-the-art and research directions
The advent of softwarized networks has enabled the deployment of chains of virtual network
and service components on computational resources from the cloud up to the edge, creating …
and service components on computational resources from the cloud up to the edge, creating …
An overview of cloud‐fog computing: Architectures, applications with security challenges
With the growing needs of data across the world, it almost hard to live without data a day.
This is almost a blessing in disguise for the researchers working on different domains and …
This is almost a blessing in disguise for the researchers working on different domains and …
Elliptic curve lightweight cryptography: A survey
CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …
industry and academy from different perspectives. Some of these aspects include …