References
- I.Yen, F.Bastani, N.Solanki, Y.Huang and S.Hwang, "Trustworthy Computing in the Dynamic IoT Cloud," 2018 IEEE International Conference on information Reuse and Integration (IRI), pp.411-418, 2018.
- S.M.Ali, A.S.Elameer and M.M.Jaber, "IoT network security using autoencoder deep neural network and channel access algorithm," Journal of Intelligent Systems, Vol.31, No.1, pp.95-103, 2022. https://doi.org/10.1515/jisys-2021-0173
- M.A.Ferrag, O.Friha, D.Hamouda, L.Maglaras and H.Janicke, "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning," IEEE Access, Vol.10, pp.40281-40306, 2022. https://doi.org/10.1109/ACCESS.2022.3165809
- S.Sachdeva and A.Ali, "Machine learning with digital forensics for attack classification in cloud network environment," International Journal of System Assurance Engineering and Management, Vol.13, No.1, pp.156-165, 2022. https://doi.org/10.1007/s13198-021-01323-4
- K.Sha, R.Errabelly, W.Wei, T.A.Yang and Z.Wang, "EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security," 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp.81-88, 2017.
- R.Sachdev, "Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments," 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), pp.341-346, 2020.
- P.M.Shakeel, S.Baskar, H.Fouad, G.Manogaran, V.Saravanan, and C.E.Montenegro-Marin, "Internet of things forensic data analysis using machine learning to identify roots of data scavenging," Future Generation Computer Systems, Vol.115, pp.756-768, 2021. https://doi.org/10.1016/j.future.2020.10.001
- J.Wang, S.Wang, L.Wang, W.Shao, S.Xu and S.Zhang, "A Blockchain and Edge Computing Based Public Audit Scheme for Cloud Storage," 2022 41st Chinese Control Conference (CCC), pp.7466-7470, 2022.
- L.Liu and K.Omote, "Efficient Authentication System Based On Blockchain Using eID card," 2023 IEEE International Conference on Blockchain (Blockchain), pp.166-171, 2023.
- Y.C.Chang, Y.S.Lin, A.K.Sangaiahc and H.T.Wu, "A Private Blockchain System based on Zero Trust Architecture," 2024 26th International Conference on Advanced Communications Technology (ICACT), pp.143-146, 2024.
- N.Almolhis, A.M.Alashjaee, S.Duraibi, F.Alqahtani and A.N.Moussa, "The Security Issues in IoT - Cloud: A Review," 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), pp.191-196, 2020.
- I.Mohiuddin and A.Almogren, "Security Challenges and Strategies for the IoT in Cloud Computing," 2020 11th International Conference on Information and Communication Systems (ICICS), pp.367-372, 2020.
- V.Hassija, V.Chamola, V.Saxena, D.Jain, P.Goyal and B.Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," IEEE Access, Vol.7, pp.82721-82743, 2019. https://doi.org/10.1109/ACCESS.2019.2924045
- A.Rahman, M.J.Islam, M.S.I. Khan, S.Kabir, A.I.Pritom and M.R.Karim, "Block-SDoTCloud: Enhancing Security of Cloud Storage through Blockchain-based SDN in IoT Network," 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI), pp.1-6, 2020.