Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Imran Makhdoom"'
Autor:
Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Negin Shariati, Daniel Franklin, Massimo Piccardi
Publikováno v:
IEEE Access, Vol 12, Pp 116740-116770 (2024)
The current age is witnessing an unprecedented dependence on data originating from humans through the devices that comprise the Internet of Things. The data collected by these devices are used for many purposes, including predictive maintenance, smar
Externí odkaz:
https://doaj.org/article/030ae488d5674961b6793bb0aeead6f4
Publikováno v:
IEEE Access, Vol 10, Pp 31981-32021 (2022)
Most of the existing science and technology parks resort to various conventional ways to attract different stakeholders to the park. Some of these traditional measures include business support, workspaces, laboratories, networking events, accommodati
Externí odkaz:
https://doaj.org/article/10bccbf42c18445a88fefe0d1aaa601e
Autor:
Ian Zhou, Imran Makhdoom, Negin Shariati, Muhammad Ahmad Raza, Rasool Keshavarz, Justin Lipman, Mehran Abolhasan, Abbas Jamalipour
Publikováno v:
IEEE Access, Vol 9, Pp 70961-71012 (2021)
Applications and technologies of the Internet of Things are in high demand with the increase of network devices. With the development of technologies such as 5G, machine learning, edge computing, and Industry 4.0, the Internet of Things has evolved.
Externí odkaz:
https://doaj.org/article/1ef91d693b3d446384087322954c3283
Publikováno v:
IEEE Access, Vol 9, Pp 137260-137280 (2021)
Collaborative Intrusion Detection Systems are considered an effective defense mechanism for large, intricate, and multilayered Industrial Internet of Things against many cyberattacks. However, while a Collaborative Intrusion Detection System successf
Externí odkaz:
https://doaj.org/article/3481753fdff64d75a5a7c999e288ec13
Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can exploit various weakn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f72d92dd1a7cc18840419cfcfd4c54a9
https://hdl.handle.net/10453/166656
https://hdl.handle.net/10453/166656
Autor:
Justin Lipman, Mehran Abolhasan, Imran Makhdoom, Muhammad Raza, Negin Shariati, Abbas Jamalipour, Ian Zhou, Rasool Keshavarz
Publikováno v:
IEEE Access, Vol 9, Pp 70961-71012 (2021)
Applications and technologies of the Internet of Things are in high demand with the increase of network devices. With the development of technologies such as 5G, machine learning, edge computing, and Industry 4.0, the Internet of Things has evolved.
Publikováno v:
Multimedia Tools and Applications. 80:9411-9457
Recently great strides have been made in the field of automatic speech recognition (ASR) by using various deep learning techniques. In this study, we present a thorough comparison between cutting-edged techniques currently being used in this area, wi
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance of intrusion detection system cannot efficiently work against advanced attack strategies. The reason is that it would not be aware of the overall con
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6b62bbc26a8957de1d964fc5e129d568
https://hdl.handle.net/10453/157992
https://hdl.handle.net/10453/157992
Publikováno v:
Journal of Network and Computer Applications. 125:251-279
The underlying technology of Bitcoin is blockchain, which was initially designed for financial value transfer only. Nonetheless, due to its decentralized architecture, fault tolerance and cryptographic security benefits such as pseudonymous identitie
Publikováno v:
LCN
The existing lottery-based consensus algorithms, such as Proof-of-Work, and Proof-of-Stake, are mostly used for blockchain-based financial technology applications. Similarly, the Byzantine Fault Tolerance algorithms do provide consensus finality, yet
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fde29b85b293057ec3ba9e5da4d77173
https://hdl.handle.net/10453/158137
https://hdl.handle.net/10453/158137