بحث بسيط
السجلات المعروضة 11 -- 20 من 1467
Trust management techniques for the internet of things: A survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be ...
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Influence blocking maximization (IBM) is a key problem for viral marketing in competitive social networks. Although the IBM problem has been extensively studied, existing works neglect the fact that the location information ...
Spammer Detection and Fake User Identification on Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily ...
Toward SLAs Guaranteed Scalable VDC Provisioning in Cloud Data Centers
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Cloud computing has been a cost-efficient paradigm for deploying various applications in datacenters in recent years. Therefore, efficient provisioning for virtual data center (VDC) requests from different service providers ...
Location privacy preservation for mobile users in location-based services
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ...
HoliTrust-A holistic cross-domain trust management mechanism for service-centric internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes commonly have a low capacity to maintain security on their own expenses, which increases the vulnerability for several attacks. ...
An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Software-defined network (SDN) is widely used in smart grid for monitoring and managing the communication network. Big data analytics for SDN-based smart grid has got increasing attention. It is a promising approach to use ...
The impact of trust, security, and privacy on individual's use of the internet for online shopping and social media: a multi-cultural study
(
Inderscience Publishers
, 2019 , Article)
This paper examines through the lens of expectancy-valence theory the impact of trust, privacy, and security on the decision to use the internet for online shopping and social media. It also investigates the moderating ...
Volatility forecasting, downside risk, and diversification benefits of Bitcoin and oil and international commodity markets: A comparative analysis with yellow metal
(
Elsevier
, 2019 , Article)
This study examines the diversification and hedging properties of Bitcoin (BTC) and gold assets for oil and S&P GSCI investors. We model and forecast the volatility performance of the pairs BTC-oil, gold-oil, BTC-S&P GSCI, ...