Ai-based mobile edge computing for iot: Applications, challenges, and future scope
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …
A survey on various security protocols of edge computing
Edge computing has emerged as a transformative data processing method by decentralizing
computations and bringing them toward the data source, significantly reducing latency and …
computations and bringing them toward the data source, significantly reducing latency and …
A survey of ddos attack and defense technologies in multi-access edge computing
Y Ma, L Liu, Z Liu, F Li, Q **e, K Chen… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Multiaccess edge computing (MEC) is a novel service paradigm located at the network's
edge, where servers with computation and storage capabilities are placed in proximity to …
edge, where servers with computation and storage capabilities are placed in proximity to …
Cloud–edge cooperation for meteorological radar big data: a review of data quality control
Z Hu, X Xu, Y Zhang, H Tang, Y Cheng, C Qian… - Complex & Intelligent …, 2021 - Springer
With the rapid development of information technology construction, increasing specialized
data in the field of informatization have become a hot spot for research. Among them …
data in the field of informatization have become a hot spot for research. Among them …
A blended deep learning intrusion detection framework for consumable edge-centric iomt industry
The demand for medical sensors in the Smart Healthcare System (SHS) creates an
intelligent Internet of Medical Things (IoMT) system. This system plays an important role in …
intelligent Internet of Medical Things (IoMT) system. This system plays an important role in …
Edge computing based secure health monitoring framework for electronic healthcare system
Abstract Nowadays, Smart Healthcare Systems (SHS) are frequently used by people for
personal healthcare observations using various smart devices. The SHS uses IoT …
personal healthcare observations using various smart devices. The SHS uses IoT …
HIDM: A hybrid intrusion detection model for cloud based systems
The cloud computing model is very popular among the users in different sectors like
banking, healthcare, education etc due to its customized low-cost services with high level …
banking, healthcare, education etc due to its customized low-cost services with high level …
Towards the development of a cloud computing intrusion detection framework using an ensemble hybrid feature selection approach
Attacks on cloud computing (CC) services and infrastructure have raised concerns about the
efficacy of data protection mechanisms in this environment. The framework developed in this …
efficacy of data protection mechanisms in this environment. The framework developed in this …
[PDF][PDF] Evaluated bird swarm optimization based on deep belief network (EBSO-DBN) classification technique for IOT network intrusion detection
A Biju, S Wilfred Franklin - Automatika: časopis za automatiku …, 2024 - hrcak.srce.hr
Because of the recent development of various intrusion detection systems (IDS), which
defend computer networks from security as well as privacy threats. The confidentiality …
defend computer networks from security as well as privacy threats. The confidentiality …
Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN‐RFOA
K Devi, B Muthusenthil - Transactions on Emerging …, 2022 - Wiley Online Library
Cloud computing (CC) is vulnerable for the attacks of current information technology,
because it prolongs and uses the information technology infrastructure, traditional operating …
because it prolongs and uses the information technology infrastructure, traditional operating …