Replication‐aware secure resource administration scheme for Internet of Things‐smart city applications

作者: Eesa Al Solami

DOI: 10.1002/ETT.4200

关键词: Scheme (programming language)Smart cityInternet of ThingsResource (project management)Replication (computing)Administration (government)Computer scienceComputer security

摘要:

参考文章(25)
Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues, A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities IEEE Communications Magazine. ,vol. 55, pp. 14- 21 ,(2017) , 10.1109/MCOM.2017.1600228CM
Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang, Secure attribute-based data sharing for resource-limited users in cloud computing Computers & Security. ,vol. 72, pp. 1- 12 ,(2018) , 10.1016/J.COSE.2017.08.007
Olivier Brun, Yonghua Yin, Erol Gelenbe, Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments Procedia Computer Science. ,vol. 134, pp. 458- 463 ,(2018) , 10.1016/J.PROCS.2018.07.183
Xiang Li, Qixu Wang, Xiao Lan, Xingshu Chen, Ning Zhang, Dajiang Chen, Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach IEEE Access. ,vol. 7, pp. 9368- 9383 ,(2019) , 10.1109/ACCESS.2018.2890432
Yasin Yılmaz, Suleyman Uludag, Timely detection and mitigation of IoT-based cyberattacks in the smart grid Journal of The Franklin Institute-engineering and Applied Mathematics. ,vol. 358, pp. 172- 192 ,(2021) , 10.1016/J.JFRANKLIN.2019.02.011
Subramani Jegadeesan, Maria Azees, Priyan Malarvizhi Kumar, Gunasekaran Manogaran, Naveen Chilamkurti, R Varatharajan, Ching-Hsien Hsu, None, An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications Sustainable Cities and Society. ,vol. 49, pp. 101522- ,(2019) , 10.1016/J.SCS.2019.101522
D. Jonathan Sebastian, Utkarsh Agrawal, Ali Tamimi, Adam Hahn, DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments IEEE Internet of Things Journal. ,vol. 6, pp. 6476- 6486 ,(2019) , 10.1109/JIOT.2019.2909768
Massimo Ficco, Francesco Palmieri, Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios Journal of Systems Architecture. ,vol. 97, pp. 107- 129 ,(2019) , 10.1016/J.SYSARC.2019.04.004
Faheem Ullah, Muhammad Ali Babar, Architectural Tactics for Big Data Cybersecurity Analytics Systems: A Review Journal of Systems and Software. ,vol. 151, pp. 81- 118 ,(2019) , 10.1016/J.JSS.2019.01.051
Tri Gia Nguyen, Trung V. Phan, Binh T. Nguyen, Chakchai So-In, Zubair Ahmed Baig, Surasak Sanguanpong, SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks IEEE Access. ,vol. 7, pp. 107678- 107694 ,(2019) , 10.1109/ACCESS.2019.2932438