Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Peter Bertok"'
Autor:
Mohammed Atiquzzaman, Seyit Camtepe, Dongxi Liu, Ibrahim Khalil, Pathum Chamikara Mahawaga Arachchige, Peter Bertok
Publikováno v:
IEEE Transactions on Industrial Informatics. 16:6092-6102
Industrial Internet of Things (IIoT) is revolutionizing many leading industries such as energy, agriculture, mining, transportation, and healthcare. IIoT is a major driving force for Industry 4.0, which heavily utilizes machine learning (ML) to capit
Autor:
Pathum Chamikara Mahawaga Arachchige, Dongxi Liu, Peter Bertok, Seyit Camtepe, Ibrahim Khalil, Mohammed Atiquzzaman
Publikováno v:
IEEE Internet of Things Journal. 7:5827-5842
The Internet of Things (IoT) is transforming major industries, including but not limited to healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually improving with innovations, such as the amalgamation of software-d
Autor:
Pathum Chamikara Mahawaga Arachchige, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertok, Ibrahim Khalil
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171390
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5ff0e51e6c225273d0153959cb519895
https://doi.org/10.1007/978-3-031-17140-6_10
https://doi.org/10.1007/978-3-031-17140-6_10
With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less at
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8d8769ec98a7135e77710ef8190e788e
https://doi.org/10.4018/978-1-7998-0417-8.ch011
https://doi.org/10.4018/978-1-7998-0417-8.ch011
Publikováno v:
Ibrahim Khalil
Personally identifiable information (PII) can find its way into cyberspace through various channels, and many potential sources can leak such information. Data sharing (e.g. cross-agency data sharing) for machine learning and analytics is one of the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d47e96595cda54e2c5e93b95db6f09f2
Publikováno v:
Ibrahim Khalil
Facial recognition technologies are implemented in many areas, including but not limited to, citizen surveillance, crime control, activity monitoring, and facial expression evaluation. However, processing biometric information is a resource-intensive
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::645ce6d3fc7f64e11ff53f840ce62b7b
Publikováno v:
Future Generation Computer Systems, 79(2), 488-499. Elsevier
With the rapidly increasing number of cloud-based services, selecting a service provider is becoming more and more difficult. Among the many factors to be considered, trust in a given service and in a service provider is often critical. Appraisal of
Publikováno v:
IEEE Cloud Computing. 4:44-54
A large and rapidly increasing number of services are offered through the Internet, in the cloud. This enables users to utilize services remotely, without even knowing the service provider. However, before putting their trust in a provider, users nee
Publikováno v:
Future Generation Computer Systems. 55:227-237
Many organizations often need to share semantic knowledge base content with selected members of other organizations. However, sharing semantic knowledge across different organizations is a critical problem. This is because the differences in the voca
Publikováno v:
International Journal of Information Technology and Web Engineering. 11:44-76
With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less at