|
|
|
Ahmad Naseem Alvi, Mumtaz Ali, Mohamed Saad Saleh, Mohammed Alkhathami, Deafallah Alsadie, Bushra Alghamdi and Badriya Alenzi
The popularity of fog-enabled smart cities is increasing due to the advantages provided by modern communication and information technologies, which contribute to an improved quality of life. Wireless networks make them more vulnerable when the network is...
ver más
|
|
|
|
|
|
|
Xinyi Meng and Daofeng Li
The explosive growth of malware targeting Android devices has resulted in the demand for the acquisition and integration of comprehensive information to enable effective, robust, and user-friendly malware detection. In response to this challenge, this pa...
ver más
|
|
|
|
|
|
|
Radheshyam Singh, Leo Mendiboure, José Soler, Michael Stübert Berger, Tidiane Sylla, Marion Berbineau and Lars Dittmann
In the near future, there will be a greater emphasis on sharing network resources between roads and railways to improve transportation efficiency and reduce infrastructure costs. This could enable the development of global Cooperative Intelligent Transpo...
ver más
|
|
|
|
|
|
|
Tongyang Xu, Yuan Liu, Zhaotai Ma, Yiqiang Huang and Peng Liu
As a new distributed machine learning (ML) approach, federated learning (FL) shows great potential to preserve data privacy by enabling distributed data owners to collaboratively build a global model without sharing their raw data. However, the heterogen...
ver más
|
|
|
|
|
|
|
Natalia Sánchez-Patiño, Gina Gallegos-Garcia and Mario E. Rivero-Angeles
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, thi...
ver más
|
|
|
|
|
|
|
Wangxi Jiang, Xiaoxiong Wu, Mingyang Song, Jiwei Qin and Zhenhong Jia
Blockchain technology is well known due to the advent of Bitcoin. With the development of recent years, blockchain technology has been widely used in medicine, digital currency, energy, etc. The practical Byzantine fault-tolerant (PBFT) algorithm is a co...
ver más
|
|
|
|
|
|
|
Sarmad Javed, Ahthasham Sajid, Tayybah Kiren, Inam Ullah Khan, Christine Dewi, Francesco Cauteruccio and Henoch Juli Christanto
The increasing use of wireless communication and IoT devices has raised concerns about security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy Networks (RPL), such as the wormhole attack. In this study, the authors h...
ver más
|
|
|
|
|
|
|
Fatemeh Stodt and Christoph Reich
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i...
ver más
|
|
|
|
|
|
|
Muneerah Al Asqah and Tarek Moulahi
The Internet of Things (IoT) compromises multiple devices connected via a network to perform numerous activities. The large amounts of raw user data handled by IoT operations have driven researchers and developers to provide guards against any malicious ...
ver más
|
|
|
|
|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|
|