Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges

SS Gill, S Tuli, M Xu, I Singh, KV Singh, D Lindsay… - Internet of Things, 2019 - Elsevier
Cloud computing plays a critical role in modern society and enables a range of applications
from infrastructure to social media. Such system must cope with varying load and evolving …

[HTML][HTML] Dynamic risk assessment in cybersecurity: A systematic literature review

P Cheimonidis, K Rantos - Future Internet, 2023 - mdpi.com
Traditional information security risk assessment (RA) methodologies and standards,
adopted by information security management systems and frameworks as a foundation …

SDN-based resource allocation in edge and cloud computing systems: An evolutionary Stackelberg differential game approach

J Du, C Jiang, A Benslimane, S Guo… - IEEE/ACM Transactions …, 2022 - ieeexplore.ieee.org
Recently, the boosting growth of computation-heavy applications raises great challenges for
the Fifth Generation (5G) and future wireless networks. As responding, the hybrid edge and …

A novel attack detection scheme for the industrial internet of things using a lightweight random neural network

S Latif, Z Zou, Z Idrees, J Ahmad - IEEE access, 2020 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) brings together many sensors, machines, industrial
applications, databases, services, and people at work. The IIoT is improving our lives in …

Journey from cloud of things to fog of things: Survey, new trends, and research directions

A Chakraborty, M Kumar… - Software: Practice and …, 2023 - Wiley Online Library
With the advent of the Internet of Things (IoT) paradigm, the cloud model is unable to offer
satisfactory services for latency‐sensitive and real‐time applications due to high latency and …

[HTML][HTML] Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

Learning games for defending advanced persistent threats in cyber systems

T Zhu, D Ye, Z Cheng, W Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
A cyber system may face to multiple attackers from diverse adversaries, who usually employ
sophisticated techniques to both continuously steal sensitive data and avoid being detected …

Stimulating trust cooperation in edge services: An evolutionary tripartite game

P Sun, S Shen, Z Wu, H Zhou, XZ Gao - Engineering Applications of …, 2022 - Elsevier
Network edge services have contributed to ordinary people's daily lives with numerous
conveniences but the accompanying problems, such as counterfeiting, the trust crisis and …

Recent developments in game-theory approaches for the detection and defense against advanced persistent threats (APTs): a systematic review

MNA Khalid, AA Al-Kadhimi, MM Singh - Mathematics, 2023 - mdpi.com
Cybersecurity has become a prominent issue in regard to ensuring information privacy and
integrity in the internet age particularly with the rise of interconnected devices. However …

A Survey of Game‐Theoretic Approach for Resource Management in Cloud Computing

MO Agbaje, OB Ohwo, TG Ayanwola… - Journal of Computer …, 2022 - Wiley Online Library
Cloud computing is a groundbreaking technique that provides a whole lot of facilities such
as storage, memory, and CPU as well as facilities such as servers and web service. It allows …