Search

Showing total 29 results
29 results

Search Results

1. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing.

2. An efficient deep recurrent neural network for detection of cyberattacks in realistic IoT environment.

3. HCDQN-ORA: a novel hybrid clustering and deep Q-network technique for dynamic user location-based optimal resource allocation in a fog environment.

4. A survey on IoT trust model frameworks.

5. Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions.

6. Research to key success factors of intelligent logistics based on IoT technology.

7. An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol.

8. An intelligent IoT-based positioning system for theme parks.

9. A self-learning approach for proactive resource and service provisioning in fog environment.

10. An efficient mutual authentication scheme for IoT systems.

11. Cognitive decision-making in smart police industry.

12. A hierarchical congestion control method in clustered internet of things.

13. Design of an IoT DDoS attack prediction system based on data mining technology.

14. Using data mining methods to develop manufacturing production rule in IoT environment.

15. A survey on computation offloading and service placement in fog computing-based IoT.

16. F-LEACH: a fuzzy-based data aggregation scheme for healthcare IoT systems.

17. A novel dual-biological-community swarm intelligence algorithm with a commensal evolution strategy for multimodal problems.

18. Using Bayesian network technology to predict the semiconductor manufacturing yield rate in IoT.

19. A systematic study of load balancing approaches in the fog computing environment.

20. Distributed composition of complex event services in IoT network.

21. Optimized clustering-based discovery framework on Internet of Things.

22. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication.

23. Benchmarking large-scale data management for Internet of Things.

24. A network clock model for time awareness in the Internet of things and artificial intelligence applications.

25. IoT service classification and clustering for integration of IoT service platforms.

26. A design and implementation of a framework for games in IoT.

27. Implementation of secret disclosure attack against two IoT lightweight authentication protocols.

28. Confidential smart-sensing framework in the IoT era.

29. Adaptive Internet of Things and Web of Things convergence platform for Internet of reality services.