Smartphone security and privacy: a survey on APTs, sensor-based attacks, side-channel attacks, google play attacks, and defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …

An application of meta‐heuristic and nature‐inspired algorithms for designing reliable networks based on the Internet of things: A systematic literature review

J Gong - International Journal of Communication Systems, 2023 - Wiley Online Library
The widespread use of Internet of Things (IoT) in various wireless sensor networks
applications has increased their importance in recent years. IoT is a smart technology that …

A survey of computation offloading with task types

S Zhang, N Yi, Y Ma - IEEE Transactions on Intelligent …, 2024 - ieeexplore.ieee.org
Computation task offloading plays a crucial role in facilitating computation-intensive
applications and edge intelligence, particularly in response to the explosive growth of …

Multi-dimensional QoS evaluation and optimization of mobile edge computing for IoT: A survey

J Huang, F Liu, J Zhang - Chinese Journal of Electronics, 2024 - ieeexplore.ieee.org
With the evolvement of the Internet of things (IoT), mobile edge computing (MEC) has
emerged as a promising computing paradigm to support IoT data analysis and processing …

UAV-aided low latency multi-access<? brk?> edge computing

Y Yu, X Bu, K Yang, H Yang, X Gao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As an emerging technique, unmanned aerial vehicle (UAV) aided multi-access edge
computing (MEC) network has been improving the performance of the communication …

A tale of two entities: Contextualizing the security of electric vehicle charging stations on the power grid

H ElHussini, C Assi, B Moussa, R Atallah… - ACM Transactions on …, 2021 - dl.acm.org
With the growing market of Electric Vehicles (EV), the procurement of their charging
infrastructure plays a crucial role in their adoption. Within the revolution of Internet of Things …

Reinforcement learning for joint optimization of communication and computation in vehicular networks

Y Cui, L Du, H Wang, D Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Ultra reliability and low latency communications (URLLC) are considered as one of the most
important use cases for computation tasks in the Internet of Vehicles (IoV) edge computing …

SVM-based task admission control and computation offloading using Lyapunov optimization in heterogeneous MEC network

N Abbas, W Fawaz, S Sharafeddine… - … on Network and …, 2022 - ieeexplore.ieee.org
Integrating device-to-device (D2D) cooperation with mobile edge computing (MEC) for
computation offloading has proven to be an effective method for extending the system …

Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC

N Abbas, S Sharafeddine, A Mourad, C Abou-Rjeily… - Computer Networks, 2022 - Elsevier
Due to the exploding traffic demands and the diversity of novel applications requiring
extensive computation and radio resources, research has been active to devise …

Latency and reliability aware edge computation offloading via an intelligent reflecting surface

E El Haber, M Elhattab, C Assi… - IEEE …, 2021 - ieeexplore.ieee.org
Despite the advantages of multi-access edge computing in enabling latency-sensitive
services and extending the limited computing capabilities of network devices, access …