Articles with "fog things" as a keyword



Photo by hudsoncrafted from unsplash

Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2984317

Abstract: Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources… read more here.

Keywords: secure; proxy encryption; encryption scheme; fog things ... See more keywords
Photo by anniespratt from unsplash

Proactive Defense for Fog-to-Things Critical Infrastructure

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.005.2100992

Abstract: Robust and adaptable cybersecurity mechanisms are needed to mitigate sophisticated and future zero-day cyberattacks and threats, particularly in the dynamic Fog of Things (FoT) computational paradigm, which makes use of massively distributed nodes. Deep learning… read more here.

Keywords: proactive defense; defense fog; things critical; fog things ... See more keywords

Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2018.1700332

Abstract: The increase in the number and diversity of smart objects has raised substantial cybersecurity challenges due to the recent exponential rise in the occurrence and sophistication of attacks. Although cloud computing has transformed the world… read more here.

Keywords: attack; detection; fog things; attack detection ... See more keywords
Photo by anniespratt from unsplash

Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2018.1701270

Abstract: The evolution and sophistication of cyber-attacks need resilient and evolving cybersecurity schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and threats from the IT environment despite the existence of a layered… read more here.

Keywords: leveraging lstm; detection; fog things; lstm networks ... See more keywords