Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Gokop Goteng"'
Publikováno v:
Network, Vol 3, Iss 4, Pp 522-537 (2023)
With the expansion of the digital world, the number of Internet of things (IoT) devices is evolving dramatically. IoT devices have limited computational power and a small memory. Consequently, existing and complex security methods are not suitable to
Externí odkaz:
https://doaj.org/article/1d09e080eeeb45ae8ea23cdf352fa3a0
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 10, Iss 4, p 61 (2021)
The fast growth of the Internet of Things (IoT) and its diverse applications increase the risk of cyberattacks, one type of which is malware attacks. Due to the IoT devices’ different capabilities and the dynamic and ever-evolving environment, appl
Externí odkaz:
https://doaj.org/article/67bbb1ca47c840ab9b269638b4ee8d98
Publikováno v:
Education Sciences; Volume 12; Issue 6; Pages: 366
The continuous increase in tuition fees in high education in many countries requires justification by the university authorities of what students receive from them in return. One of the key factors of student recruitment is values for money and quali
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2d8e8e0d9a4157aae6dc4fb0068a25b9
https://eprints.gla.ac.uk/271215/1/271215.pdf
https://eprints.gla.ac.uk/271215/1/271215.pdf
Publikováno v:
Frontiers of Computer Science. 16
ConclusionSecurity and ease of provisioning of IoT devices onto cloud infrastructure is instrumental to the deployment of IoT devices. With not much information available on the ease of secure provisioning of IoT devices couple with inherent challeng
Publikováno v:
INFOCOM Workshops
The Internet of Things (IoT) paradigm is a key enabler to many critical applications, thus demands reliable security measures. IoT devices have limited computational power, hence, are inadequate to carry rigorous security mechanisms. This paper propo
Publikováno v:
CSEDU (1)
Autor:
Ahfaz Ahmed, Khalid Al-Qurashi, Gokop Goteng, William L. Roberts, S. Mani Sarathy, Vijai Shankar Bhavani Shankar
Publikováno v:
Fuel. 143:290-300
Gasoline is the most widely used fuel for light duty automobile transportation, but its molecular complexity makes it intractable to experimentally and computationally study the fundamental combustion properties. Therefore, surrogate fuels with a sim
Autor:
Gokop Goteng, Xueyu Tao
Publikováno v:
BigData Congress
We used directed graph to come up with an interconnected network of terrorists' activities based on data obtained from the Global Terrorism Database (GTD) from 2005 to 2015. We developed an analytical model called CloudTerrorAlert (CTA) and implement
Publikováno v:
CIRP Journal of Manufacturing Science and Technology. 3:249-261
The emerging grid technology is defined as an infrastructure for secure and coordinated large-scale resource sharing. In this paper, we describe the architecture and grid services of DECGrid. DECGrid enables distributed design experts to collaborate
Publikováno v:
2013 International Conference on Information Science and Cloud Computing Companion.
Combustion experiments and chemical kinetics simulations generate huge data that is computationally and data intensive. A cloud-based cyber infrastructure known as Cloud Flame is implemented to improve the computational efficiency, scalability and av