Search

Showing total 319 results

Search Constraints

Start Over You searched for: Topic internet of things Remove constraint Topic: internet of things Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Journal journal of supercomputing Remove constraint Journal: journal of supercomputing
319 results

Search Results

1. A review of studies on internet of everything as an enabler of neuromarketing methods and techniques.

2. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing.

3. A collaborative ledger storing model for lightweight blockchains based on Chord Ring.

4. A federated learning approach to network intrusion detection using residual networks in industrial IoT networks.

5. An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing.

6. Evolving random weight neural networks based on oversampled-segmented examples for IoT intrusion detection.

7. Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives.

8. Blockchain-based IoT enabled health monitoring system.

9. Resource discovery approaches in cloudIoT: a systematic review.

10. Development of a smart tourism service system based on the Internet of Things and machine learning.

11. Applications hosting over cloud-assisted IOT: a productivity model and method defining accessibility of data security.

12. A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management.

13. An efficient resource allocation of IoT requests in hybrid fog–cloud environment.

14. High-level power estimation techniques in embedded systems hardware: an overview.

15. AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things.

16. Smart home security: challenges, issues and solutions at different IoT layers.

17. Clustering-based data integrity verification approach for multi-replica in a fog environment.

18. Concentration phenomenon about h-extra edge-connectivity of the n-th cartesian product of complete graph K4 with large-scale faulty links.

19. A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism.

20. Optimized task scheduling and preemption for distributed resource management in fog-assisted IoT environment.

21. Dual-Q network deep reinforcement learning-based computation offloading method for industrial internet of things.

22. GFSPX: an efficient lightweight block cipher for resource-constrained IoT nodes.

23. Fusion of deep belief network and SVM regression for intelligence of urban traffic control system.

24. Blockchain based distributed trust management in IoT and IIoT: a survey.

25. IoV security and privacy survey: issues, countermeasures, and challenges.

26. A trust management system for fog computing using improved genetic algorithm.

27. Identifying cloud internet of things requirements in healthcare: a Delphi-based study.

28. A systematic survey of data mining and big data analysis in internet of things.

29. Financial sequence prediction based on swarm intelligence algorithms and internet of things.

30. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure.

31. Time-aware neural ordinary differential equations for incomplete time series modeling.

32. Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions.

33. A distributed prediction–compression-based mechanism for energy saving in IoT networks.

34. IoBT: beamforming design in internet of things.

35. Examining the status of CPU working load, processing load and controller bandwidth under the influence of packet-in buffer status located in Openflow switches in SDN-based IoT framework.

36. Fair and energy-aware IoT service composition under QoS constraints.

37. Service placement in fog–cloud computing environments: a comprehensive literature review.

38. A novel RPL defense mechanism based on trust and deep learning for internet of things.

39. Fog-Marketing: auction-based multi-tier decentralized markets for fog resource provisioning.

40. Mellin transform-based D2D power optimization in 5G-enabled social IoT network.

41. Securing IoT networks in cloud computing environments: a real-time IDS.

42. An efficient deep recurrent neural network for detection of cyberattacks in realistic IoT environment.

43. Fft-asvr: an adaptive approach for accurate prediction of IoT data streams.

44. EIDM: deep learning model for IoT intrusion detection systems.

45. An autonomous planning model for solving IoT service placement problem using the imperialist competitive algorithm.

46. Secrecy aware key management scheme for Internet of Healthcare Things.

47. E-CropReco: a dew-edge-based multi-parametric crop recommendation framework for internet of agricultural things.

48. A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things.

49. An efficient centralized DDoS attack detection approach for Software Defined Internet of Things.

50. High-performance fuzzy optimized deep convolutional neural network model for big data classification based on the social internet of things.