Integrated structural health monitoring in bridge engineering
Integrated structural health monitoring (SHM) uses the mechanism analysis, monitoring
technology and data analytics to diagnose the classification, location and significance of …
technology and data analytics to diagnose the classification, location and significance of …
Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges
I Yaqoob, E Ahmed, IAT Hashem… - IEEE wireless …, 2017 - ieeexplore.ieee.org
Recent years have witnessed tremendous growth in the number of smart devices, wireless
technologies, and sensors. In the foreseeable future, it is expected that trillions of devices …
technologies, and sensors. In the foreseeable future, it is expected that trillions of devices …
Robust and secure wireless communications via intelligent reflecting surfaces
In this paper, intelligent reflecting surfaces (IRSs) are employed to enhance the physical
layer security in a challenging radio environment. In particular, a multi-antenna access point …
layer security in a challenging radio environment. In particular, a multi-antenna access point …
CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
A distributed deep learning system for web attack detection on edge devices
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …
devices and sensors transmit huge amounts of data to cloud data centers for further …
Block-DEF: A secure digital evidence framework using blockchain
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
BPDS: A blockchain based privacy-preserving data sharing for electronic medical records
Electronic medical record (EMR) is a crucial form of healthcare data, currently drawing a lot
of attention. Sharing health data is considered to be a critical approach to improve the …
of attention. Sharing health data is considered to be a critical approach to improve the …
When energy trading meets blockchain in electrical power system: The state of the art
With the rapid growth of renewable energy resources, energy trading has been shifting from
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Edge computing provides high-class intelligent services and computing capabilities at the
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …