Search
Now showing items 1-10 of 11
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged restorative methodology, are a type of implantable medical device which uses electrical stimulation to treat neurological disorders. These devices ...
Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Mobile-edge computing (MEC) has emerged as a new computing paradigm with great potential to alleviate resource limitations attributed to mobile device users (MDUs) by offloading intensive computations to ubiquitous MEC ...
A survey on federated learning: The journey from centralized to distributed on-site learning and beyond
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Driven by privacy concerns and the visions of deep learning, the last four years have witnessed a paradigm shift in the applicability mechanism of machine learning (ML). An emerging model, called federated learning (FL), ...
Battery status-aware authentication scheme for V2G networks in smart grid
(2013 , Article)
Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ...
Secure and distributed data discovery and dissemination in wireless sensor networks
(
IEEE Computer Society
, 2015 , Article)
A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery ...
HoliTrust-A holistic cross-domain trust management mechanism for service-centric internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes commonly have a low capacity to maintain security on their own expenses, which increases the vulnerability for several attacks. ...
Secure Lending: Blockchain and Prospect Theory-Based Decentralized Credit Scoring Model
(
IEEE Computer Society
, 2020 , Article)
Credit scoring is a rigorous statistical analysis carried out by lenders and other third parties to access an individual's creditworthiness. Lenders use credit scoring to estimate the degree of risk in lending money to an ...
Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Electric vehicles (EVs) have been slowly replacing conventional fuel based vehicles since the last decade. EVs are not only environment-friendly but when used in conjunction with a smart grid, also open up new possibilities ...
StabTrust-A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Vehicular Ad-hoc Network (VANET) is a modern era of dynamic information distribution among societies. VANET provides an extensive diversity of applications in various domains, such as Intelligent Transport System (ITS) and ...