A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing
暂无分享,去创建一个
Ateeq Ur Rehman | Paul A. Watters | Mamoun Alazab | Mian Ahmad Jan | Spyridon Mastorakis | Fazlullah Khan | P. Watters | Spyridon Mastorakis | M. Alazab | F. Khan | A. Rehman | M. Jan | A. Rehman | Fazlullah Khan
[1] Ying Liu,et al. Agent and Cyber-Physical System Based Self-Organizing and Self-Adaptive Intelligent Shopfloor , 2017, IEEE Transactions on Industrial Informatics.
[2] Dervis Karaboga,et al. AN IDEA BASED ON HONEY BEE SWARM FOR NUMERICAL OPTIMIZATION , 2005 .
[3] Hao Luo,et al. MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things , 2020, IEEE Transactions on Industrial Informatics.
[4] Wei Ni,et al. Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[5] Zhen Liu,et al. An Adaptive Ensemble Machine Learning Model for Intrusion Detection , 2019, IEEE Access.
[6] Sam Kwong,et al. Genetic algorithms and their applications , 1996, IEEE Signal Process. Mag..
[7] E. Bijolin Edwin,et al. An improved efficient: Artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment , 2017, Cluster Computing.
[8] Zhibo Pang,et al. Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks , 2021, IEEE Transactions on Industrial Informatics.
[9] M. Shamim Hossain,et al. Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics , 2019, IEEE Transactions on Industrial Informatics.
[10] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[11] Zhiyuan Tan,et al. SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application , 2019, J. Netw. Comput. Appl..
[12] Victor Chang,et al. Latency-Aware Path Planning for Disconnected Sensor Networks With Mobile Sinks , 2020, IEEE Transactions on Industrial Informatics.
[13] Fangchun Yang,et al. Edgence: A blockchain-enabled edge-computing platform for intelligent IoT-based dApps , 2020, China Communications.
[14] Wei Dong,et al. Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks , 2015, IEEE Transactions on Industrial Informatics.
[15] MengChu Zhou,et al. Modeling and Planning for Dual-Objective Selective Disassembly Using and/or Graph and Discrete Artificial Bee Colony , 2019, IEEE Transactions on Industrial Informatics.
[16] Sam Kwong,et al. An Improved Artificial Bee Colony Algorithm With its Application , 2019, IEEE Transactions on Industrial Informatics.
[17] Haibin Zhang,et al. Double Auction-Based Resource Allocation for Mobile Edge Computing in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[18] Philip S. Yu,et al. Distributed Deep Learning Model for Intelligent Video Surveillance Systems with Edge Computing , 2019, IEEE Transactions on Industrial Informatics.
[19] Wei Yao,et al. Artificial intelligence-based load optimization in cognitive Internet of Things , 2020, Neural Computing and Applications.
[20] Albert Y. Zomaya,et al. En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment , 2020, J. Parallel Distributed Comput..
[21] Deniz Ustun,et al. A Triple-Objective Optimization Scheme Using Butterfly-Integrated ABC Algorithm for Design of Multilayer RAM , 2020, IEEE Transactions on Antennas and Propagation.
[22] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[23] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[24] Jong-Hyouk Lee,et al. Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network , 2019, IEEE Transactions on Industrial Informatics.