Search
Now showing items 231-240 of 326
TamForen: A tamper-proof cloud forensic framework
(
John Wiley and Sons Inc
, 2022 , Article)
Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive ...
Exploiting Client-Side Collected Measurements to Perform QoS Assessment of IaaS
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Delivering reliable service offerings to clients remain a challenging aspect in today's cloud infrastructure. A broad number of research studies have undertaken the service evaluation process from one side; that is, the ...
An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) has set off a new information technology revolution due to its convenience and efficiency. An IoT enables sharing economy, as more people are willing to share their own things (mostly mobile ...
Privacy-Aware Collaborative Task Offloading in Fog Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ...
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks
(2013 , Article)
Wireless sensor networks (WSNs) are widely applicable in monitoring and control of environment parameters. It is sometimes necessary to disseminate data through wireless links after they are deployed in order to adjust ...
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ...
Optimal Cooperative Relaying and Power Control for IoUT Networks with Reinforcement Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Internet of Underwater Things (IoUT) consists of numerous sensor nodes distributed in an underwater area for sensing, collecting, processing information, and sending related messages to the data processing center. However, ...
Blockchain for decentralized multi-drone to combat COVID-19 and future pandemics: Framework and proposed solutions
(
John Wiley and Sons Inc
, 2021 , Article)
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic ...
Maximizing secondary-user satisfaction in large-scale DSA systems through distributed team cooperation
(2012 , Article)
We develop resource and service management techniques to support secondary users (\su s) with QoS requirements in large-scale distributed dynamic spectrum access (\osa) systems. The proposed techniques empower \su s to ...
A survey on federated learning: The journey from centralized to distributed on-site learning and beyond
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Driven by privacy concerns and the visions of deep learning, the last four years have witnessed a paradigm shift in the applicability mechanism of machine learning (ML). An emerging model, called federated learning (FL), ...