A comprehensive survey on smartnics: Architectures, development models, applications, and research directions
The end of Moore's Law and Dennard Scaling has slowed processor improvements in the
past decade. While multi-core processors have improved performance, they are limited by …
past decade. While multi-core processors have improved performance, they are limited by …
A survey of DDoS attack detection techniques for IoT systems using Blockchain technology
ZA Khan, AS Namin - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) is a network of sensors that helps collect data 24/7 without
human intervention. However, the network may suffer from problems such as the low battery …
human intervention. However, the network may suffer from problems such as the low battery …
CIA-CVD: cloud based image analysis for COVID-19 vaccination distribution
Due to the huge impact of COVID-19, the world is currently facing a medical emergency and
shortage of vaccine. Many countries do not have enough medical equipment and …
shortage of vaccine. Many countries do not have enough medical equipment and …
Towards double defense network security based on multi-identifier network architecture
Recently, more and more mobile devices have been connected to the Internet. The Internet
environment is complicated, and network security incidents emerge endlessly. Traditional …
environment is complicated, and network security incidents emerge endlessly. Traditional …
PatchesNet: PatchTST-based multi-scale network security situation prediction
H Yi, S Zhang, D An, Z Liu - Knowledge-Based Systems, 2024 - Elsevier
Abstract Internet of Things (IoT) technology increases connectivity between devices;
however, IoT device networks are less secure, making them highly susceptible to attack …
however, IoT device networks are less secure, making them highly susceptible to attack …
How to dissolve the “privacy paradox” in social networks? A game approach based on privacy calculus
X Zhang, Y Cai, F Liu, F Zhou - Kybernetes, 2024 - emerald.com
Purpose This paper aims to propose a solution for dissolving the “privacy paradox” in social
networks, and explore the feasibility of adopting a synergistic mechanism of “deep-learning …
networks, and explore the feasibility of adopting a synergistic mechanism of “deep-learning …
A Scalable Security Approach in IoT Networks: Smart Contracts and Anomaly-based IDS for Gateways using Hardware Accelerators
With the widespread integration of new technologies, IoT devices are becoming increasingly
diverse and capable of handling highly complex tasks, compared to previous generations …
diverse and capable of handling highly complex tasks, compared to previous generations …
Snapshot for Power Grids IoT: Adaptive Measurement for Resilience Intelligent Internet of Things
Y Zhao, G Cheng, C Liu, Z Chen… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the wide application of Internet of Things (IoT) devices in the power grids, the
sophisticated feedback on their operating status is of great significance for improving …
sophisticated feedback on their operating status is of great significance for improving …
An IoT Security Risk Assessment Framework for Healthcare Environment
Risk Assessment for IoT is important for analyzing the risks associated with deploying and
using IoT technologies. A risk assessment framework helps organizations identify, assess …
using IoT technologies. A risk assessment framework helps organizations identify, assess …
Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach
With the proliferation of edge devices, there is a significant increase in attack surface on
these devices. The decentralized deployment of threat intelligence on edge devices …
these devices. The decentralized deployment of threat intelligence on edge devices …