Secure Edge Computing最新文献

筛选
英文 中文
Early Identification of Mental Health Disorder Employing Machine Learning-based Secure Edge Analytics 利用基于机器学习的安全边缘分析早期识别精神健康障碍
Secure Edge Computing Pub Date : 2021-08-12 DOI: 10.1201/9781003028635-10
Naveen Kumar Oburi, Tahrat Tazrin, Akshai Ramesh, P. Sagar, S. Sakib, M. Fouda, Z. Fadlullah
{"title":"Early Identification of Mental Health Disorder Employing Machine Learning-based Secure Edge Analytics","authors":"Naveen Kumar Oburi, Tahrat Tazrin, Akshai Ramesh, P. Sagar, S. Sakib, M. Fouda, Z. Fadlullah","doi":"10.1201/9781003028635-10","DOIUrl":"https://doi.org/10.1201/9781003028635-10","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124141921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Securing Electronic Healthcare Records Using Hyperledger Fabric Across the Network Edge 在网络边缘使用超级账本结构保护电子医疗记录
Secure Edge Computing Pub Date : 2021-08-12 DOI: 10.1201/9781003028635-12
Sarthak Kothari, Tahrat Tazrin, Dhruvi Desai, Anam Parveen, M. Fouda, Z. Fadlullah
{"title":"On Securing Electronic Healthcare Records Using Hyperledger Fabric Across the Network Edge","authors":"Sarthak Kothari, Tahrat Tazrin, Dhruvi Desai, Anam Parveen, M. Fouda, Z. Fadlullah","doi":"10.1201/9781003028635-12","DOIUrl":"https://doi.org/10.1201/9781003028635-12","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Vehicular Edge Computing Security 车辆边缘计算安全
Secure Edge Computing Pub Date : 2021-08-12 DOI: 10.1201/9781003028635-16
Mehmet Ali Eken, Pelin Angin
{"title":"Vehicular Edge Computing Security","authors":"Mehmet Ali Eken, Pelin Angin","doi":"10.1201/9781003028635-16","DOIUrl":"https://doi.org/10.1201/9781003028635-16","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115599122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative and Integrated Edge Security Architecture 协作和集成边缘安全架构
Secure Edge Computing Pub Date : 2021-08-12 DOI: 10.1201/9781003028635-3
A. Diro
{"title":"Collaborative and Integrated Edge Security Architecture","authors":"A. Diro","doi":"10.1201/9781003028635-3","DOIUrl":"https://doi.org/10.1201/9781003028635-3","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132272047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Unmanned Aerial Vehicles in Wireless Networks 无人机在无线网络中的应用
Secure Edge Computing Pub Date : 2021-08-12 DOI: 10.1201/9781003028635-15
Aniqa Tasnim Oishi, Leeyana Farheen Rahman, Mosarrat Jahan Siddika, Shahriar Arnab, S. R. Sabuj
{"title":"Application of Unmanned Aerial Vehicles in Wireless Networks","authors":"Aniqa Tasnim Oishi, Leeyana Farheen Rahman, Mosarrat Jahan Siddika, Shahriar Arnab, S. R. Sabuj","doi":"10.1201/9781003028635-15","DOIUrl":"https://doi.org/10.1201/9781003028635-15","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130613785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Organizational Strategy 安全和组织策略
Secure Edge Computing Pub Date : 2021-08-12 DOI: 10.1201/9781003028635-5
Monjur Ahmed, K. Petrova
{"title":"Security and Organizational Strategy","authors":"Monjur Ahmed, K. Petrova","doi":"10.1201/9781003028635-5","DOIUrl":"https://doi.org/10.1201/9781003028635-5","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Aided Secured ECG Live Edge Monitoring System with a Practical Use-Case 人工智能辅助安全心电实时边缘监测系统与实际用例
Secure Edge Computing Pub Date : 2021-08-12 DOI: 10.1201/9781003028635-13
Ajay Kumar, Tahrat Tazrin, Arti Sharma, Shivani Chaskar, S. Sakib, M. Fouda, Z. Fadlullah
{"title":"AI-Aided Secured ECG Live Edge Monitoring System with a Practical Use-Case","authors":"Ajay Kumar, Tahrat Tazrin, Arti Sharma, Shivani Chaskar, S. Sakib, M. Fouda, Z. Fadlullah","doi":"10.1201/9781003028635-13","DOIUrl":"https://doi.org/10.1201/9781003028635-13","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115894655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy of Edge Computing and IoT 边缘计算和物联网的隐私
Secure Edge Computing Pub Date : 2021-06-28 DOI: 10.1201/9781003028635-7
D. Glance, R. Cardell-Oliver
{"title":"Privacy of Edge Computing and IoT","authors":"D. Glance, R. Cardell-Oliver","doi":"10.1201/9781003028635-7","DOIUrl":"https://doi.org/10.1201/9781003028635-7","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Exploiting Blockchain Technology to Approach toward Secured, Sliced and Edge Deployed Virtual Network Functions for Improvised IoT Services 利用区块链技术实现临时物联网服务的安全、切片和边缘部署虚拟网络功能
Secure Edge Computing Pub Date : 2021-06-28 DOI: 10.1201/9781003028635-18
Mahzabeen Emu, Salimur Choudhury
{"title":"On Exploiting Blockchain Technology to Approach toward Secured, Sliced and Edge Deployed Virtual Network Functions for Improvised IoT Services","authors":"Mahzabeen Emu, Salimur Choudhury","doi":"10.1201/9781003028635-18","DOIUrl":"https://doi.org/10.1201/9781003028635-18","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123277082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reducing the Attack Surface of Edge Computing IoT Networks via Hybrid Routing Using Dedicated Nodes 利用专用节点的混合路由减少边缘计算物联网网络的攻击面
Secure Edge Computing Pub Date : 2021-06-28 DOI: 10.1201/9781003028635-9
James Jin Kang, L. Sikos, Wencheng Yang
{"title":"Reducing the Attack Surface of Edge Computing IoT Networks via Hybrid Routing Using Dedicated Nodes","authors":"James Jin Kang, L. Sikos, Wencheng Yang","doi":"10.1201/9781003028635-9","DOIUrl":"https://doi.org/10.1201/9781003028635-9","url":null,"abstract":"","PeriodicalId":211654,"journal":{"name":"Secure Edge Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123547736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信