بحث بسيط
السجلات المعروضة 1 -- 10 من 45
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
(
Elsevier B.V.
, 2020 , Article)
Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ...
Hierarchical security paradigm for iot multiaccess edge computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The rise in embedded and IoT device usage comes with an increase in LTE usage as well. About 70% of an estimated 18 billion IoT devices will be using cellular LTE networks for efficient connections. This introduces several ...
RL-PDNN: Reinforcement Learning for Privacy-Aware Distributed Neural Networks in IoT Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Due to their high computational and memory demand, deep learning applications are mainly restricted to high-performance units, e.g., cloud and edge servers. Particularly, in Internet of Things (IoT) systems, the data ...
Evolution of Internet of Things from Blockchain to IOTA: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Internet of Things (IoT) is the new paradigm to the scaling nature of things and their elements, interconnected, exchanging data over a network supported with nodes. The Ubiquitous use of tiny devices and embedded sensor ...
On Designing Smart Agents for Service Provisioning in Blockchain-powered Systems
(
IEEE Computer Society
, 2021 , Article)
Service provisioning systems assign users to service providers according to allocation criteria that strike an optimal trade-off between users Quality of Experience (QoE) and the operation cost endured by providers. These ...
Detecting anomalies within smart buildings using do-it-yourself internet of things
(
Springer
, 2022 , Article)
Detecting anomalies at the time of happening is vital in environments like buildings and homes to identify potential cyber-attacks. This paper discussed the various mechanisms to detect anomalies as soon as they occur. We ...
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML
(
Elsevier
, 2022 , Article Review)
Internet of Medical Things (IoMT) supports traditional healthcare systems by providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It enables the development of smart hardware as ...
Towards a Comprehensive Study of Fatigue Deducing Techniques for Evaluating the Quality of Experience of Haptic-Visual Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the advancement of cellular communications and the achievement of 5th Generation (5G) mobile networks, a new class of multimedia systems, refereed to as the Tactile Internet, is becoming more prominent. Consequently, ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ...