Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

A survey on various security protocols of edge computing

T Bhattacharya, AV Peddi, S Ponaganti… - The Journal of …, 2025 - Springer
Edge computing has emerged as a transformative data processing method by decentralizing
computations and bringing them toward the data source, significantly reducing latency and …

A survey of ddos attack and defense technologies in multi-access edge computing

Y Ma, L Liu, Z Liu, F Li, Q **e, K Chen… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Multiaccess edge computing (MEC) is a novel service paradigm located at the network's
edge, where servers with computation and storage capabilities are placed in proximity to …

Cloud–edge cooperation for meteorological radar big data: a review of data quality control

Z Hu, X Xu, Y Zhang, H Tang, Y Cheng, C Qian… - Complex & Intelligent …, 2021 - Springer
With the rapid development of information technology construction, increasing specialized
data in the field of informatization have become a hot spot for research. Among them …

A blended deep learning intrusion detection framework for consumable edge-centric iomt industry

JA Alzubi, OA Alzubi, I Qiqieh… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The demand for medical sensors in the Smart Healthcare System (SHS) creates an
intelligent Internet of Medical Things (IoMT) system. This system plays an important role in …

Edge computing based secure health monitoring framework for electronic healthcare system

A Singh, K Chatterjee - Cluster Computing, 2023 - Springer
Abstract Nowadays, Smart Healthcare Systems (SHS) are frequently used by people for
personal healthcare observations using various smart devices. The SHS uses IoT …

HIDM: A hybrid intrusion detection model for cloud based systems

LK Vashishtha, AP Singh, K Chatterjee - Wireless Personal …, 2023 - Springer
The cloud computing model is very popular among the users in different sectors like
banking, healthcare, education etc due to its customized low-cost services with high level …

Towards the development of a cloud computing intrusion detection framework using an ensemble hybrid feature selection approach

NO Ogwara, K Petrova, ML Yang - Journal of Computer …, 2022 - Wiley Online Library
Attacks on cloud computing (CC) services and infrastructure have raised concerns about the
efficacy of data protection mechanisms in this environment. The framework developed in this …

[PDF][PDF] Evaluated bird swarm optimization based on deep belief network (EBSO-DBN) classification technique for IOT network intrusion detection

A Biju, S Wilfred Franklin - Automatika: časopis za automatiku …, 2024 - hrcak.srce.hr
Because of the recent development of various intrusion detection systems (IDS), which
defend computer networks from security as well as privacy threats. The confidentiality …

Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN‐RFOA

K Devi, B Muthusenthil - Transactions on Emerging …, 2022 - Wiley Online Library
Cloud computing (CC) is vulnerable for the attacks of current information technology,
because it prolongs and uses the information technology infrastructure, traditional operating …