Results 1 to 10 of about 51,827 (294)
Automated and Secure Onboarding for System of Systems
The Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services.
Silia Maksuti +8 more
doaj +1 more source
Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt +2 more
doaj +1 more source
Edge storage, as a supplement to cloud storage, reduces latency by providing services in a timely and efficient manner near the source. In a collaborative edge storage datacenter network (CESN), not only does the edge storage datacenter (ESDC) that is ...
Wenlong Ke +3 more
doaj +1 more source
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare.
Fatemeh Stodt, Christoph Reich
doaj +1 more source
Demystifying MLOps and Presenting a Recipe for the Selection of Open-Source Tools
Nowadays, machine learning projects have become more and more relevant to various real-world use cases. The success of complex Neural Network models depends upon many factors, as the requirement for structured and machine learning-centric project ...
Philipp Ruf +3 more
doaj +1 more source
On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels ...
Mengdie Han, Jiliang Zhang
doaj +1 more source
An insider user authentication method based on improved temporal convolutional network
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao +4 more
doaj +1 more source
Cyber resilience and cyber security issues of intelligent cloud computing systems
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj +1 more source
Security Audit of a Blockchain-Based Industrial Application Platform
In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and ...
Jan Stodt +5 more
doaj +1 more source
Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination
In this paper, we investigate the physical layer security for an asymmetric dual-hop radio frequency-free space optical (RF-FSO) communication system, in which a source transmits information to a multi-aperture destination (D) through a best relay under ...
Jiliang Zhang +3 more
doaj +1 more source

