A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption
暂无分享,去创建一个
[1] Pratibha Rani,et al. Big data analytics challenges to implementing the intelligent Industrial Internet of Things (IIoT) systems in sustainable manufacturing operations , 2023, Technological Forecasting and Social Change.
[2] Ambrish Sharma,et al. A Taxonomy towards Blockchain based Multimedia content Security , 2022, 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT).
[3] Ashish Tiwari,et al. A Taxonomy towards fog computing Resource Allocation , 2022, 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT).
[4] Ashish Tiwari,et al. Attack Detection Taxonomy System in cloud services , 2022, 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT).
[5] Shenmin Zhang,et al. Efficient Gaussian Kernel Microcluster Real-Time Clustering Method for Industrial Internet of Things (IIoT) Streams , 2022, IEEE Internet of Things Journal.
[6] Govind P. Gupta,et al. BDTwin: An Integrated Framework for Enhancing Security and Privacy in Cybertwin-Driven Automotive Industrial Internet of Things , 2022, IEEE Internet of Things Journal.
[7] Govind P. Gupta,et al. P2TIF: A Blockchain and Deep Learning Framework for Privacy-Preserved Threat Intelligence in Industrial IoT , 2022, IEEE Transactions on Industrial Informatics.
[8] Udit Mamodiya,et al. Detection of recurring vulnerabilities in computing services , 2022, Journal of Discrete Mathematical Sciences and Cryptography.
[9] Dinesh Singh,et al. Chaos based image encryption security in cloud computing , 2022, Journal of Discrete Mathematical Sciences and Cryptography.
[10] K. Kotecha,et al. An efficient, provably-secure DAG based consensus mechanism for industrial internet of things , 2022, International Journal on Interactive Design and Manufacturing (IJIDeM).
[11] C. Diwaker,et al. Efficient Opportunities and Boundaries towards Internet of Things (IoT) Cost Adaptive Model , 2022, 2022 IEEE Delhi Section Conference (DELCON).
[12] M. Rafsanjani,et al. Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning , 2022, Int. J. Cloud Appl. Comput..
[13] Ashish Tiwari,et al. A Optimized Taxonomy on Spot Sale Services Using Mathematical Methodology , 2022, Int. J. Secur. Priv. Pervasive Comput..
[14] Ashish Tiwari,et al. Reservation System for Cloud Computing Resources (RSCC): Immediate Reservation of the Computing Mechanism , 2022, Int. J. Cloud Appl. Comput..
[15] Ashish Tiwari,et al. Orrs Orchestration of a Resource Reservation System Using Fuzzy Theory in High-Performance Computing: Lifeline of the Computing World , 2022, Int. J. Softw. Innov..
[16] Ashish Tiwari,et al. Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems , 2022, International Journal on Semantic Web and Information Systems.
[17] Zhen Ying,et al. An Overview of Computational Models for Industrial Internet of Things to Enhance Usability , 2021, Complex..
[18] Rupinder Kaur,et al. Optimization classification of sunflower recognition through machine learning , 2021 .
[19] K. Vijayakumar. Concurrent Engineering: Research and Applications (CERA)– An international journal: Special issue on “Data Analytics in Industrial Internet of Things (IIoT)” , 2021, Concurrent Engineering - Research and Applications.
[20] Manjusha Pandey,et al. IIoT: A Survey and Review of Theoretical Concepts , 2020, Interoperability in IoT for Smart Systems.
[21] Awais Ahmed,et al. A novel and secure attacks detection framework for smart cities industrial internet of things , 2020 .
[22] Jacques Jansen,et al. A Framework for Industrial Internet of Things , 2020, I3E.
[23] B. Muthusenthil,et al. A reliable next generation cyber security architecture for industrial internet of things environment , 2020 .
[24] Dong-Seong Kim,et al. Toward Reliable Fog Computing Architecture for Industrial Internet of Things , 2019 .
[25] Sarvesh Kumar Kumar,et al. Security Challenges and Application for Underwater Wireless Sensor Network , 2018 .
[26] Joe Cunningham,et al. The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..
[27] Leandros A. Maglaras,et al. Managing incident response in the industrial internet of things , 2018 .
[28] Manal M. Khayyat,et al. Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment , 2022, Alexandria Engineering Journal.
[29] The Industrial Internet of Things Networking Framework , 2022 .
[30] T. Chelladurai,et al. The industrial internet of things (IIoT): An analysis framework for industry 4.0 applications , 2022, INTERNATIONAL CONFERENCE ON RESEARCH IN SCIENCES, ENGINEERING & TECHNOLOGY.
[31] R. Suman,et al. Upgrading the manufacturing sector via applications of Industrial Internet of Things (IIoT) , 2021, Sensors International.
[32] Mamoona Humayun,et al. Cyber Security and Privacy Issues in Industrial Internet of Things , 2021, Comput. Syst. Sci. Eng..
[33] Sudip Misra,et al. Deep Learning-Based Reliable Routing Attack Detection Mechanism for Industrial Internet of Things , 2021, Ad Hoc Networks.
[34] Ritu Garg,et al. ACCOS: A Hybrid Anomaly-Aware Cloud Computing Formulation-Based Ontology Services in Clouds , 2021, ISIC.
[35] Ashish Tiwari,et al. A Skywatch on the Challenging Gradual Progression of Scheduling in Cloud Computing , 2019, Lecture Notes in Electrical Engineering.
[36] Ashish Tiwari,et al. Eagle Techniques in Cloud Computational Formulation , 2019, International Journal of Innovative Technology and Exploring Engineering.
[37] Megan Kline,et al. Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting , 2017, IoTBDS.
[38] Ashish Tiwari,et al. Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters , 2015 .