Security Challenges and Strategies for the IoT in Cloud Computing
暂无分享,去创建一个
[1] Nadra Guizani,et al. Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs , 2019, IEEE Access.
[2] Mohsen Guizani,et al. 5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning , 2020, IEEE Access.
[3] Qian Wang,et al. SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage , 2020, IEEE Internet of Things Journal.
[4] Victor I. Chang,et al. A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment , 2018, Future Gener. Comput. Syst..
[5] Ikram Ud Din,et al. Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things , 2019, IEEE Access.
[6] Ahmad Almogren,et al. An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology , 2018, Cluster Computing.
[7] Ahmad S. Almogren,et al. SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography , 2019, IEEE Access.
[8] Ahmad Almogren,et al. Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model , 2020, IEEE Transactions on Industrial Informatics.
[9] Ahmad S. Al-Mogren. Developing a Powerful and Resilient Smart Body Sensor Network through Hypercube Interconnection , 2015, Int. J. Distributed Sens. Networks.
[10] Hanan Elazhary,et al. Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions , 2019, J. Netw. Comput. Appl..
[11] Klaus Wehrle,et al. A comprehensive approach to privacy in the cloud-based Internet of Things , 2016, Future Gener. Comput. Syst..
[12] WehrleKlaus,et al. A comprehensive approach to privacy in the cloud-based Internet of Things , 2016 .
[13] Muhammad Al-Qurishi,et al. Analysis of network issues and their impact on Cloud Storage , 2019, 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS).
[14] IBRAHIM S. ALKHALIFA,et al. NSSC: Novel Segment Based Safety Message Broadcasting in Cluster-Based Vehicular Sensor Network , 2020, IEEE Access.
[15] Stefano Savazzi,et al. A Cloud-IoT Platform for Passive Radio Sensing: Challenges and Application Case Studies , 2018, IEEE Internet of Things Journal.
[16] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[17] Ahmad Almogren,et al. An efficient networking protocol for internet of things to handle multimedia big data , 2018, Multimedia Tools and Applications.
[18] Ahmad Almogren,et al. Workload aware VM consolidation method in edge/cloud computing for IoT applications , 2019, J. Parallel Distributed Comput..
[19] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[20] Mohsen Guizani,et al. RobustTrust – A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things , 2019, IEEE Access.
[21] Jenjira Jaimunk. Privacy-preserving cloud-IoT architecture , 2019, MOBILESoft@ICSE.
[22] Vijay Kumar,et al. Data in your space [wireless access] , 2001, Proceedings Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2001.
[23] Ahmad S. Almogren,et al. A Resilient Smart Body Sensor Network Through Pyramid Interconnection , 2019, IEEE Access.
[24] Ahmad S. Almogren,et al. Intrusion detection in Edge-of-Things computing , 2020, J. Parallel Distributed Comput..
[25] Xuyun Zhang,et al. A computation offloading method over big data for IoT-enabled cloud-edge computing , 2019, Future Gener. Comput. Syst..