Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

Cryptographic solutions for industrial Internet-of-Things: Research challenges and opportunities

KKR Choo, S Gritzalis, JH Park - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) is an emerging trend, including in nontraditional
technological sector (eg, oil and gas industry). There are, however, a number of research …

Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks

K Gai, Y Wu, L Zhu, L Xu… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The blooming trend of smart grid deployment is engaged by the evolution of the network
technology, as the connected environment offers various alternatives for electrical data …

Block-DEF: A secure digital evidence framework using blockchain

Z Tian, M Li, M Qiu, Y Sun, S Su - Information Sciences, 2019 - Elsevier
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …

Controllable and trustworthy blockchain-based cloud data management

L Zhu, Y Wu, K Gai, KKR Choo - Future Generation Computer Systems, 2019 - Elsevier
In recent years, there have been efforts to deploy blockchain in a broad range of
applications and in different domains, such as the critical infrastructure sectors. Generally …

A guide to fully homomorphic encryption

F Armknecht, C Boyd, C Carr, K Gjøsteen… - Cryptology ePrint …, 2015 - eprint.iacr.org
Fully homomorphic encryption (FHE) has been dubbed the holy grail of cryptography, an
elusive goal which could solve the IT world's problems of security and trust. Research in the …

Optimal resource allocation using reinforcement learning for IoT content-centric services

K Gai, M Qiu - Applied Soft Computing, 2018 - Elsevier
The exponential growing rate of the networking technologies has led to a dramatical large
scope of the connected computing environment. Internet-of-Things (IoT) is considered an …

An integrated cyber security risk management approach for a cyber-physical system

HI Kure, S Islam, MA Razzaque - Applied Sciences, 2018 - mdpi.com
A cyber-physical system (CPS) is a combination of physical system components with cyber
capabilities that have a very tight interconnectivity. CPS is a widely used technology in many …

Task migration for mobile edge computing using deep reinforcement learning

C Zhang, Z Zheng - Future Generation Computer Systems, 2019 - Elsevier
Mobile edge computing (MEC) is a new network architecture that puts computing
capabilities and storage resource at the edges of the network in a distributed manner …

[HTML][HTML] Security and privacy issues in e-health cloud-based system: A comprehensive content analysis

NA Azeez, C Van der Vyver - Egyptian Informatics Journal, 2019 - Elsevier
The recent advancement in Information and Communication Technology (ICT) has
undoubtedly improved services in all sectors in the world. Specifically, Information …