IECL: An Intelligent Energy Consumption Model for Cloud Manufacturing | 0 | 0.34 | 2022 |
Cryptanalysis of a Honeyword System in the IoT Platform | 0 | 0.34 | 2022 |
Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures) | 0 | 0.34 | 2022 |
CHFL: A Collaborative Hierarchical Federated Intrusion Detection System for Vehicular Networks | 0 | 0.34 | 2022 |
Slight: A lightweight authentication scheme for smart healthcare services | 0 | 0.34 | 2022 |
An authentication and key agreement scheme for smart grid | 0 | 0.34 | 2022 |
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing | 1 | 0.35 | 2022 |
Intelligent-Reflecting-Surface-Empowered Wireless-Powered Caching Networks | 0 | 0.34 | 2022 |
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach | 0 | 0.34 | 2022 |
Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment | 1 | 0.35 | 2022 |
DEHM: An Improved Differential Evolution Algorithm Using Hierarchical Multistrategy in a Cybertwin 6G Network | 1 | 0.35 | 2022 |
Can Open and AI-Enabled 6G RAN Be Secured? | 0 | 0.34 | 2022 |
Intelligent Multimedia Networks | 0 | 0.34 | 2021 |
Closed-loop and open-loop authentication protocols for blockchain-based IoT systems | 1 | 0.34 | 2021 |
A priority, power and traffic-aware virtual machine placement of IoT applications in cloud data centers | 1 | 0.34 | 2021 |
Neural Architecture Search for Robust Networks in 6G-Enabled Massive IoT Domain | 1 | 0.34 | 2021 |
LEVER: Secure Deduplicated Cloud Storage with EncryptedTwo-Party Interactions in Cyber-Physical Systems | 2 | 0.36 | 2021 |
AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center | 2 | 0.37 | 2021 |
FUPE: A security driven task scheduling approach for SDN-based IoT–Fog networks | 0 | 0.34 | 2021 |
RSS: An Energy-Efficient Approach for Securing IoT Service Protocols Against the DoS Attack | 2 | 0.37 | 2021 |
Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT | 5 | 0.39 | 2021 |
IADE: An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G Network | 0 | 0.34 | 2021 |
Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain | 1 | 0.35 | 2021 |
HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs | 5 | 0.51 | 2021 |
Similarity-based Android malware detection using Hamming distance of static binary features. | 5 | 0.48 | 2020 |
On Defending Against Label Flipping Attacks on Malware Detection Systems | 3 | 0.48 | 2020 |
A secure biometric-based authentication protocol for global mobility networks in smart cities | 1 | 0.35 | 2020 |
A job scheduling algorithm for delay and performance optimization in fog computing | 3 | 0.40 | 2020 |
Priority, network and energy-aware placement of IoT-based application services in fog-cloud environments | 4 | 0.39 | 2020 |
A New Secure Data Dissemination Model in Internet of Drones | 2 | 0.35 | 2019 |
Recent advances in cloud data centers toward fog data centers. | 0 | 0.34 | 2019 |
Optimal management of reusable functional blocks in 5G superfluid networks | 1 | 0.35 | 2019 |
Software defined service function chaining with failure consideration for fog computing. | 0 | 0.34 | 2019 |
Joint Task Offloading and Resource Allocation for Delay-sensitive Fog Networks | 0 | 0.34 | 2019 |
PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things | 1 | 0.35 | 2019 |
Identification of Android malware using refined system calls | 0 | 0.34 | 2019 |
An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers. | 1 | 0.36 | 2018 |
Joint Failure Recovery, Fault Prevention, and Energy-efficient Resource Management for Real-time SFC in Fog-supported SDN. | 4 | 0.39 | 2018 |
Joint Minimization of the Energy Costs From Computing, Data Transmission, and Migrations in Cloud Data Centers. | 2 | 0.36 | 2018 |
Energy-efficient path allocation heuristic for service function chaining | 0 | 0.34 | 2018 |
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware. | 0 | 0.34 | 2018 |
An Optimization Model to Reduce Energy Consumption in Software-Defined Data Centers. | 0 | 0.34 | 2017 |
P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks. | 65 | 1.63 | 2017 |
Barrier coverage of WSNs with the imperialist competitive algorithm. | 7 | 0.55 | 2017 |
A Novel Distributed Fog-Based Networked Architecture To Preserve Energy In Fog Data Centers | 2 | 0.35 | 2017 |
Cluster-head based feedback for simplified time reversal prefiltering in ultra-wideband systems. | 10 | 0.68 | 2017 |
Q*: Energy and delay-efficient dynamic queue management in TCP/IP virtualized data centers. | 12 | 0.75 | 2017 |
Joint Energy Efficient and QoS-aware Path Allocation and VNF Placement for Service Function Chaining. | 16 | 0.62 | 2017 |
FLAPS: bandwidth and delay-efficient distributed data searching in Fog-supported P2P content delivery networks. | 13 | 0.54 | 2017 |
Mobile Cloud Computing: Challenges and Future Research Directions | 0 | 0.34 | 2017 |