Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2984317
Abstract: Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources…
read more here.
Keywords:
secure;
proxy encryption;
encryption scheme;
fog things ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Communications Magazine"
DOI: 10.1109/mcom.005.2100992
Abstract: Robust and adaptable cybersecurity mechanisms are needed to mitigate sophisticated and future zero-day cyberattacks and threats, particularly in the dynamic Fog of Things (FoT) computational paradigm, which makes use of massively distributed nodes. Deep learning…
read more here.
Keywords:
proactive defense;
defense fog;
things critical;
fog things ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Communications Magazine"
DOI: 10.1109/mcom.2018.1700332
Abstract: The increase in the number and diversity of smart objects has raised substantial cybersecurity challenges due to the recent exponential rise in the occurrence and sophistication of attacks. Although cloud computing has transformed the world…
read more here.
Keywords:
attack;
detection;
fog things;
attack detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Communications Magazine"
DOI: 10.1109/mcom.2018.1701270
Abstract: The evolution and sophistication of cyber-attacks need resilient and evolving cybersecurity schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and threats from the IT environment despite the existence of a layered…
read more here.
Keywords:
leveraging lstm;
detection;
fog things;
lstm networks ... See more keywords