Real-time big data processing for anomaly detection: A survey

RAA Habeeb, F Nasaruddin, A Gani… - International Journal of …, 2019 - Elsevier
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …

Advances on spectrum sensing for cognitive radio networks: Theory and applications

A Ali, W Hamouda - IEEE communications surveys & tutorials, 2016 - ieeexplore.ieee.org
Due to the under-utilization problem of the allocated radio spectrum, cognitive radio (CR)
communications have recently emerged as a reliable and effective solution. Among various …

Intrusion detection in cloud computing based on time series anomalies utilizing machine learning

AR Al-Ghuwairi, Y Sharrab, D Al-Fraihat… - Journal of Cloud …, 2023 - Springer
The growth of cloud computing is hindered by concerns about privacy and security. Despite
the widespread use of network intrusion detection systems (NIDS), the issue of false …

Internet of underground things in precision agriculture: Architecture and technology aspects

MC Vuran, A Salam, R Wong, S Irmak - Ad Hoc Networks, 2018 - Elsevier
The projected increases in World population and need for food have recently motivated
adoption of information technology solutions in crop fields within precision agriculture …

The Internet of Things: A review of enabled technologies and future challenges

IU Din, M Guizani, S Hassan, BS Kim, MK Khan… - Ieee …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging classical model, envisioned as a system of
billions of small interconnected devices for posing the state-of-the-art findings to real-world …

Resource allocation for underlay cognitive radio networks: A survey

M El Tanab, W Hamouda - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
For conventional wireless networks, the main target of resource allocation (RA) is to
efficiently utilize the available resources. Generally, there are no changes in the available …

Effects of heterogeneous mobility on D2D-and drone-assisted mission-critical MTC in 5G

A Orsino, A Ometov, G Fodor… - IEEE …, 2017 - ieeexplore.ieee.org
mcMTC is starting to play a central role in the industrial Internet of Things ecosystem and
have the potential to create high-revenue businesses, including intelligent transportation …

MAC layer protocols for Internet of Things: A survey

L Oliveira, JJPC Rodrigues, SA Kozlov, RAL Rabêlo… - Future Internet, 2019 - mdpi.com
Due to the wide variety of uses and the diversity of features required to meet an application,
Internet of Things (IoT) technologies are moving forward at a strong pace to meet this …

Resource optimization for delay-tolerant data in blockchain-enabled IoT with edge computing: A deep reinforcement learning approach

M Li, FR Yu, P Si, W Wu, Y Zhang - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Recently, the development of the Internet of Things (IoT) provides plenty of opportunities and
challenges in various fields. As an essential part of IoT, machine-to-machine (M2M) …

Machine-to-machine communications in ultra-dense networks—A survey

S Chen, R Ma, HH Chen, H Zhang… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
To achieve 1000-fold capacity increase in 5G wireless communications, ultradense network
(UDN) is believed to be one of the key enabling technologies. Most of the previous research …