Search

Showing total 59 results
59 results

Search Results

1. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing.

2. An efficient deep recurrent neural network for detection of cyberattacks in realistic IoT environment.

3. A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things.

4. Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks.

5. HCDQN-ORA: a novel hybrid clustering and deep Q-network technique for dynamic user location-based optimal resource allocation in a fog environment.

6. Trust-driven reinforcement selection strategy for federated learning on IoT devices.

7. An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm.

8. A survey on IoT trust model frameworks.

9. Jaya clustering-based algorithm for multiobjective IoV network routing optimization.

10. A comprehensive analysis for crowd counting methodologies and algorithms in Internet of Things.

11. Simulation and Modeling for Anomaly Detection in IoT Network Using Machine Learning.

12. Towards intelligent user clustering techniques for non-orthogonal multiple access: a survey.

13. A novel selfish node detection based on reputation and game theory in Internet of Things.

14. Intelligent root cause detection in Industry 4.0: a secure cross-validation of blockchain architecture for product failure checker.

15. Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions.

16. Intelligent resource allocation decision using deep learning and optimization techniques for HetNets.

17. DAIP: a delay-efficient and availability-aware IoT application placement in fog environments.

18. SUACC-IoT: secure unified authentication and access control system based on capability for IoT.

19. IoT with Multimedia Investigation: A Secure Process of Digital Forensics Chain-of-Custody using Blockchain Hyperledger Sawtooth.

20. Dynamic spectrum optimization for Internet-of-Things with social distance model.

21. S-DAC: A Novel Dynamic Substitution boxes using hybrid chaotic system and Deoxyribonuceic Acid(DNA) coding for counterfeiting Side-Channel Attacks.

22. MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach.

23. Internet of Things Based Communication Architecture for Switchport Security and Energy Management in Interoperable Smart Microgrids.

24. Towards building data analytics benchmarks for IoT intrusion detection.

25. Research to key success factors of intelligent logistics based on IoT technology.

26. Security in IoT-enabled smart agriculture: architecture, security solutions and challenges.

27. An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol.

28. Using blockchain technology in IoT manufacture environment for intelligence prediction.

29. Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem.

30. Optimizing deadline violation time and energy consumption of IoT jobs in fog–cloud computing.

31. An intelligent IoT-based positioning system for theme parks.

32. Novel bat algorithm for QoS-aware services composition in large scale internet of things.

33. Clustering of mobile IoT nodes with support for scheduling of time-sensitive applications in fog and cloud layers.

34. A self-learning approach for proactive resource and service provisioning in fog environment.

35. An efficient mutual authentication scheme for IoT systems.

36. EDCCS: effective deterministic clustering scheme based compressive sensing to enhance IoT based WSNs.

37. An elliptic curve cryptosystem-based secure RFID mutual authentication for Internet of things in healthcare environment.

38. Machine learning-based cloud IOT platform for intelligent tourism information services.

39. Deep reinforcement learning based QoE-aware actor-learner architectures for video streaming in IoT environments.

40. Cognitive decision-making in smart police industry.

41. An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing.

42. A hierarchical congestion control method in clustered internet of things.

43. Design of an IoT DDoS attack prediction system based on data mining technology.

44. Using data mining methods to develop manufacturing production rule in IoT environment.

45. A fuzzy approach for optimal placement of IoT applications in fog-cloud computing.

46. A survey on computation offloading and service placement in fog computing-based IoT.

47. Utility Maximization of Capacity Entropy for Dense IEEE 802.11ax WLANs based on Interference Characteristics.

48. DTMFTalk: a DTMF-Based Realization of IoT Remote Control for Smart-Home Elderly Care.

49. F-LEACH: a fuzzy-based data aggregation scheme for healthcare IoT systems.

50. A novel mechanism to handle address spoofing attacks in SDN based IoT.