Articles with "detection fog" as a keyword



Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2018.1700332

Abstract: The increase in the number and diversity of smart objects has raised substantial cybersecurity challenges due to the recent exponential rise in the occurrence and sophistication of attacks. Although cloud computing has transformed the world… read more here.

Keywords: attack; detection; fog things; attack detection ... See more keywords
Photo by anniespratt from unsplash

Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2018.1701270

Abstract: The evolution and sophistication of cyber-attacks need resilient and evolving cybersecurity schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and threats from the IT environment despite the existence of a layered… read more here.

Keywords: leveraging lstm; detection; fog things; lstm networks ... See more keywords