An overview of security and privacy in smart cities' IoT communications
F Al‐Turjman, H Zahmatkesh… - Transactions on …, 2022 - Wiley Online Library
Smart cities have brought significant improvements in quality of life and services to citizens
and urban environments. They are fully enabled to control the physical objects in real time …
and urban environments. They are fully enabled to control the physical objects in real time …
Machine learning in cybersecurity: a comprehensive survey
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
A survey on security threats and defensive techniques of machine learning: A data driven view
Machine learning is one of the most prevailing techniques in computer science, and it has
been widely applied in image processing, natural language processing, pattern recognition …
been widely applied in image processing, natural language processing, pattern recognition …
Security and privacy in smart cities: Challenges and opportunities
Smart cities are expected to improve the quality of daily life, promote sustainable
development, and improve the functionality of urban systems. Now that many smart systems …
development, and improve the functionality of urban systems. Now that many smart systems …
Networking for big data: A survey
Complementary to the fancy big data applications, networking for big data is an
indispensable supporting platform for these applications in practice. This emerging research …
indispensable supporting platform for these applications in practice. This emerging research …
Attribution classification method of APT malware in IoT using machine learning techniques
S Li, Q Zhang, X Wu, W Han… - Security and …, 2021 - Wiley Online Library
In recent years, the popularity of IoT (Internet of Things) applications and services has
brought great convenience to people′ s lives, but ubiquitous IoT has also brought many …
brought great convenience to people′ s lives, but ubiquitous IoT has also brought many …
Privacy-preserving data encryption strategy for big data in mobile cloud computing
Privacy has become a considerable issue when the applications of big data are dramatically
growing in cloud computing. The benefits of the implementation for these emerging …
growing in cloud computing. The benefits of the implementation for these emerging …
Ec2: Ensemble clustering and classification for predicting android malware families
T Chakraborty, F Pierazzi… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
As the most widely used mobile platform, Android is also the biggest target for mobile
malware. Given the increasing number of Android malware variants, detecting malware …
malware. Given the increasing number of Android malware variants, detecting malware …
Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based IoT networks
S Shen, L Huang, H Zhou, S Yu… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
We consider the Internet of Things (IoT) with malware diffusion and seek optimal malware
detection strategies for preserving the privacy of smart objects in IoT networks and …
detection strategies for preserving the privacy of smart objects in IoT networks and …
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
The concept of the Internet of Vehicles (IoV) has attracted the attention of many sectors such
as the automotive industry, academia, engineering, etc., offering a wide variety of benefits …
as the automotive industry, academia, engineering, etc., offering a wide variety of benefits …