Search
Now showing items 1-10 of 36
Malicious mining code detection based on ensemble learning in cloud computing environment
(
Elsevier B.V.
, 2021 , Article)
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ...
An Energy-Efficient In-Network Computing Paradigm for 6G
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the 6G network era, energy-efficient computing means higher resource utilization and lower energy consumption. The traditional computing model regards the network as a transmission pipeline and has not fully explored ...
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks
(
Springer Science and Business Media Deutschland GmbH
, 2021 , Article)
The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise ...
Contract and lyapunov optimization-based load scheduling and energy management for UAV charging stations
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Nowadays, a large number of civilian unmanned aerial vehicles (UAVs) are increasingly being used in many of our daily applications. However, there are many kinds of UAVs that need to enhance their endurance due to their ...
RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
While the widespread use of ubiquitously connected devices in Internet of Everything (IoE) offers enormous benefits, it also raises serious privacy concerns. Federated learning, as one of the promising solutions to alleviate ...
Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources ...
Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS
(
Academic Press Inc.
, 2021 , Article)
HDFS faces several issues when it comes to handling a large number of small files. These issues are well addressed by archive systems, which combine small files into larger ones. They use index files to hold relevant ...
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
(
IEEE Computer Society
, 2021 , Article)
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Vehicular Ad hoc Network (VANET) is an enabling technology to provide a variety of convenient services in intelligent transportation systems, and yet vulnerable to various intrusion attacks. Intrusion detection systems ...
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ...