Results 1 to 10 of about 51,827 (294)

Automated and Secure Onboarding for System of Systems

open access: yesIEEE Access, 2021
The Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services.
Silia Maksuti   +8 more
doaj   +1 more source

Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing

open access: yesApplied Sciences, 2023
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt   +2 more
doaj   +1 more source

A Priority-Based Multicast Flow Scheduling Method for a Collaborative Edge Storage Datacenter Network

open access: yesIEEE Access, 2021
Edge storage, as a supplement to cloud storage, reduces latency by providing services in a timely and efficient manner near the source. In a collaborative edge storage datacenter network (CESN), not only does the edge storage datacenter (ESDC) that is ...
Wenlong Ke   +3 more
doaj   +1 more source

Introducing a Fair Tax Method to Harden Industrial Blockchain Applications against Network Attacks: A Game Theory Approach

open access: yesComputers, 2023
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare.
Fatemeh Stodt, Christoph Reich
doaj   +1 more source

Demystifying MLOps and Presenting a Recipe for the Selection of Open-Source Tools

open access: yesApplied Sciences, 2021
Nowadays, machine learning projects have become more and more relevant to various real-world use cases. The success of complex Neural Network models depends upon many factors, as the requirement for structured and machine learning-centric project ...
Philipp Ruf   +3 more
doaj   +1 more source

On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels ...
Mengdie Han, Jiliang Zhang
doaj   +1 more source

An insider user authentication method based on improved temporal convolutional network

open access: yesHigh-Confidence Computing, 2023
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao   +4 more
doaj   +1 more source

Cyber resilience and cyber security issues of intelligent cloud computing systems

open access: yesResults in Control and Optimization, 2023
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj   +1 more source

Security Audit of a Blockchain-Based Industrial Application Platform

open access: yesAlgorithms, 2021
In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and ...
Jan Stodt   +5 more
doaj   +1 more source

Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination

open access: yesIEEE Photonics Journal, 2020
In this paper, we investigate the physical layer security for an asymmetric dual-hop radio frequency-free space optical (RF-FSO) communication system, in which a source transmits information to a multi-aperture destination (D) through a best relay under ...
Jiliang Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy