Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Farnaz Derakhshan"'
Publikováno v:
IEEE Access, Vol 9, Pp 12027-12043 (2021)
Virtual Network Embedding (VNE), which provides methods to assign multiple Virtual Networks (VN) to a single physical Substrate Network (SN), is an important task in network virtualization. The main problem in VNE is the efficiency of assigning custo
Externí odkaz:
https://doaj.org/article/db88d31c205a42cc90faa149aa931797
Publikováno v:
IEEE Access, Vol 9, Pp 126502-126529 (2021)
Driven by the vision of cloud and edge computing as the 5th utility, a major challenge is the efficient resource management and pricing taking into account incentives and preferences of cloud/edge providers, users, and the system. In recent years, au
Externí odkaz:
https://doaj.org/article/32b4602442f44528b2538ba7ce23dfc4
Autor:
Farzad Darbandi, Amirreza Jafari, Hadis Karimipour, Ali Dehghantanha, Farnaz Derakhshan, Kim-Kwang Raymond Choo
Publikováno v:
IET Smart Grid (2020)
The increasing coupling between the physical and communication layers in the cyber-physical system (CPS) brings up new challenges in system monitoring and control. Smart power grids with the integration of information and communication technologies a
Externí odkaz:
https://doaj.org/article/409c47dfa8454f15ada8811068ccb67e
Autor:
Farnaz Derakhshan, Shamim Yousefi
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 15 (2019)
Nowadays, the efficiency of multiagent systems in wireless sensor networks prompts the researchers to use these emerging mobile software packets in different simulated approaches or real-world applications. Heterogeneous and distributed wireless sens
Externí odkaz:
https://doaj.org/article/61448f240dd34e4a86be7cf97565c35c
Publikováno v:
IEEE Transactions on Cloud Computing. 10:1557-1570
Edge computing is a new computing paradigm, aims at enhancing user experience by bringing computing resources closer to where data is produced by Internet of Things (IoT). Edge services are provided by small data centers located at the edge of networ
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789819904150
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::058ab28adcb289f75bfad61c6c6a616d
https://doi.org/10.1007/978-981-99-0416-7_80
https://doi.org/10.1007/978-981-99-0416-7_80
Autor:
Nafiseh Sharghivand, Farnaz Derakhshan
Publikováno v:
AI-Enabled Threat Detection and Security Analysis for Industrial IoT ISBN: 9783030766122
Today, the integration of Industry 4.0 and IoT has opened up new opportunities for generation, processing, and sharing vast amounts of data inside the industrial plants. However, along with the brought value, comes serious concerns about data securit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f74ab92a5209ce298d362eb1953730d5
https://doi.org/10.1007/978-3-030-76613-9_3
https://doi.org/10.1007/978-3-030-76613-9_3
Autor:
Nafiseh Sharghivand, Farnaz Derakhshan
Publikováno v:
AI-Enabled Threat Detection and Security Analysis for Industrial IoT ISBN: 9783030766122
While the advent of IIoT has brought significant value and convenience to the industry, it is accompanied by different security risks including anomalies in the collected data. Anomalies can appear in the system due to various reasons such as hardwar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e7b762d31847410a8ce82e1b6b5b400b
https://doi.org/10.1007/978-3-030-76613-9_9
https://doi.org/10.1007/978-3-030-76613-9_9
Publikováno v:
2020 IEEE Electric Power and Energy Conference (EPEC).
In the critical infrastructure of the Internet of Things (IoT), the most efficient approach for data collection is to employ the software Mobile Agents (MAs). In MA-based data collection, the energy exhaustion of wireless communications is much more
Autor:
Hadis Karimipour, Shahrzad Hadayeghparast, Mahdi Amrollahi, Gautam Srivastava, Farnaz Derakhshan
Publikováno v:
Handbook of Big Data Privacy ISBN: 9783030385569
Handbook of Big Data Privacy
Handbook of Big Data Privacy
Network security can be defined as the act of protecting any given network against threats that may lead to the availability of the network to be compromised. Moreover, we can also add that unauthorized access or even misuse of network-accessible res
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a85ebd805654b5cdacb7cc9e44134a3b
https://doi.org/10.1007/978-3-030-38557-6_8
https://doi.org/10.1007/978-3-030-38557-6_8