Computer Science Review最新文献

筛选
英文 中文
Comprehensive survey on resource allocation for edge-computing-enabled metaverse 边缘计算支持的元宇宙资源分配综合调查
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-09-09 DOI: 10.1016/j.cosrev.2024.100680
Tanmay Baidya, Sangman Moh
{"title":"Comprehensive survey on resource allocation for edge-computing-enabled metaverse","authors":"Tanmay Baidya,&nbsp;Sangman Moh","doi":"10.1016/j.cosrev.2024.100680","DOIUrl":"10.1016/j.cosrev.2024.100680","url":null,"abstract":"<div><p>With the rapid evaluation of virtual and augmented reality, massive Internet of Things networks and upcoming 6 G communication give rise to an emerging concept termed the “metaverse,” which promises to revolutionize how we interact with the digital world by offering immersive experiences between reality and virtuality. Edge computing, another novel paradigm, propels the metaverse functionality by enhancing real-time interaction and reducing latency, providing a responsive and seamless virtual environment. However, realizing the full potential of the metaverse requires dynamic and efficient resource-allocation strategies to handle the immense demand for communicational, computational, and storage resources required by its diverse applications. This survey comprehensively explores resource-allocation strategies in the context of an edge-computing-enabled metaverse, investigating various challenges, existing techniques, and emerging trends in this rapidly expanding field. We first explore the underlying metaverse characteristics and pivotal role of edge computing, after which we investigate various types of resources and their key issues and challenges. We also provide a brief discussion on offloading and caching strategies, which are the most prominent research issues in this context. In this study, we compare and analyze 35 different resource-allocation strategies, benchmark 19 algorithms, and investigate their suitability across diverse metaverse scenarios, offering a broader scope than existing surveys. The survey aims to serve as a comprehensive guide for researchers and practitioners, helping them navigate the complexities of resource allocation in the metaverse and supporting the development of more efficient, scalable, and user-centric virtual environments.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges 物联网应用的量子安全认证和密钥协议:全面调查与公开挑战
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-08-31 DOI: 10.1016/j.cosrev.2024.100676
Ponnuru Raveendra Babu , Sathish A.P. Kumar , Alavalapati Goutham Reddy , Ashok Kumar Das
{"title":"Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges","authors":"Ponnuru Raveendra Babu ,&nbsp;Sathish A.P. Kumar ,&nbsp;Alavalapati Goutham Reddy ,&nbsp;Ashok Kumar Das","doi":"10.1016/j.cosrev.2024.100676","DOIUrl":"10.1016/j.cosrev.2024.100676","url":null,"abstract":"<div><p>This study provides an in-depth survey of quantum secure authentication and key agreement protocols, investigating the dynamic landscape of cryptographic techniques within the realm of quantum computing. With the potential threat posed by quantum computing advancements to classical cryptographic protocols, the exploration of secure authentication and key agreement in the quantum era becomes imperative for safeguarding communication systems. The research scrutinizes evolving methodologies and innovations designed to enhance the security of authentication processes and key agreements in the context of quantum computing. A comprehensive examination of existing protocols is conducted, elucidating their strengths, limitations, and potential vulnerabilities. The research includes a comparative assessment of security features and computational burdens associated with various quantum secure authentication and key agreement protocols. The survey concludes by underscoring the urgent need for further research in the development of secure and efficient quantum cloud computing environments, as well as lightweight post-quantum cryptographic primitives, to ensure the viability of quantum secure authentication protocols on a universal scale. This comprehensive overview serves as a valuable resource for researchers, practitioners, and policymakers in the rapidly evolving field of quantum secure communication.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain 万物互联与元世界:用区块链连接物理世界和虚拟世界
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-08-30 DOI: 10.1016/j.cosrev.2024.100678
Wajid Rafique , Junaid Qadir
{"title":"Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain","authors":"Wajid Rafique ,&nbsp;Junaid Qadir","doi":"10.1016/j.cosrev.2024.100678","DOIUrl":"10.1016/j.cosrev.2024.100678","url":null,"abstract":"<div><p>The Metaverse is an evolving technology that leverages the Internet infrastructure and the massively connected Internet of Everything (IoE) to create an immersive virtual world. In the Metaverse, humans engage in activities similar to those in the real world, such as socializing, working, attending events, exploring virtual landscapes, creating and trading digital assets, participating in virtual economies, and experiencing entertainment and cultural activities. By using advanced technologies such as IoE, extended reality (XR), artificial intelligence (AI), machine learning (ML), and 6G communication, along with blockchain technology, the Metaverse bridges the physical and virtual worlds. In particular, <em>Blockchain-Enabled IoE</em> (BIoE) will play a crucial role in Metaverse applications by ensuring secure service provisioning through the integration of blockchain with IoE. It efficiently manages the massive connectivity of physical world objects and enhances security, integrity, and decentralization of trust, while increasing resilience against failures, thus securing and fostering trust in both physical and virtual Metaverse networks. While some view the Metaverse as a detached virtual world, technologies like mixed reality and digital twins highlight the need for complementarity and interactive co-existence between the physical and virtual worlds. Blockchain facilitates this co-existence by providing a secure and trusted framework for integrating and synchronizing data and activities across both environments, developing trust through the reliability and authenticity of interactions and transactions. However, despite substantial advancements in related fields, there remains a significant gap in comprehensive surveys that address the integration of AI/ML, 6G, and blockchain in the Metaverse. In this paper, we fill this gap by examining BIoE’s capabilities in bridging the physical and virtual worlds and securing Metaverse applications across various domains, such as immersive energy grids, immersive healthcare, and immersive living. We explore BIoE’s role in service provisioning in the Metaverse, including access control, privacy protection, authentication, attack identification, and trust management. Additionally, we present a detailed taxonomy of existing literature, discuss novel use cases, and explore the synergies and practical implementations of BIoE in Metaverse applications. Finally, we address current challenges and propose future research directions to advance the field of BIoE in the Metaverse.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis 人体生理学和面部生物力学对构建稳健的深度伪造检测器的作用:全面调查与分析
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-08-30 DOI: 10.1016/j.cosrev.2024.100677
Rajat Chakraborty, Ruchira Naskar
{"title":"Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis","authors":"Rajat Chakraborty,&nbsp;Ruchira Naskar","doi":"10.1016/j.cosrev.2024.100677","DOIUrl":"10.1016/j.cosrev.2024.100677","url":null,"abstract":"<div><p>AI based multimedia content generation, already having achieved hyper-realism, deeply influences human perception and trust. Since emerging around late 2017, deepfake technology has rapidly gained popularity due to its diverse applications, raising significant concerns regarding its malicious and unethical use. Although many deepfake detectors have been developed by forensic researchers in recent years, there is an urgent need for robust detectors that can overcome demographic, social, and cultural barriers in identifying deepfakes. To identify a human as a human, to distinguish a person from a synthetic entity, the literature faces compelling necessity to introduce deepfake detectors that can withstand all forms of demographic and social biases. (Multiple researches have been conducted in recent times to prove the existence of social and demographic biases in synthetic media detectors.) In this article, we examine human physiological signals as the foundation for robust deepfake detectors, and present a survey of recent developments in deepfake detection research that relies on human physiological signals and facial biomechanics. We perform in-depth analysis of the techniques to understand the contribution of human physiology in deepfake detection. Hence, we comprehend how human physiology based deepfake detectors fare by exploiting the inherent robustness of physiological signals, in contrast to other existing detectors.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic literature review on chaotic maps-based image security techniques 基于混沌图的图像安全技术系统文献综述
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-08-26 DOI: 10.1016/j.cosrev.2024.100659
Dilbag Singh , Sharanpreet Kaur , Mandeep Kaur , Surender Singh , Manjit Kaur , Heung-No Lee
{"title":"A systematic literature review on chaotic maps-based image security techniques","authors":"Dilbag Singh ,&nbsp;Sharanpreet Kaur ,&nbsp;Mandeep Kaur ,&nbsp;Surender Singh ,&nbsp;Manjit Kaur ,&nbsp;Heung-No Lee","doi":"10.1016/j.cosrev.2024.100659","DOIUrl":"10.1016/j.cosrev.2024.100659","url":null,"abstract":"<div><p>Images play a substantial role in various applications such as medical imaging, satellite imaging, and military communications. These images often contain confidential and sensitive information, and are typically transmitted over public networks. As a result, they are vulnerable to various security threats. Therefore, efficient image security techniques are necessary to protect these images from unauthorized access and modification. This paper aims to present a systematic study of chaotic map-based image security techniques. Due to poor selection criteria, existing studies on image security techniques suffer from high overlap among the reviewed methods. Moreover, these reviews often lack depth and cover a limited number of articles. In this paper, we study three well-known chaotic map-based image security models: image encryption, image steganography, and image watermarking. Articles were selected from reputable databases such as IEEE Xplore, Scopus, and Web of Science (WOS). This paper provides a systematic analysis of the fundamental concepts, performance metrics, and security aspects of chaotic map-based image security techniques. Comparisons are drawn among the existing techniques to evaluate their relative strengths. From this extensive review, various issues associated with the current chaotic map-based image security techniques are highlighted. Finally, future directions in the field of chaotic map-based image security are discussed, which can guide researchers in their future work.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142075949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing 从朦胧到无朦胧:多图像、单图像和基于 CNN 的去雾算法综合概览
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-08-26 DOI: 10.1016/j.cosrev.2024.100669
Jehoiada Jackson , Kwame Obour Agyekum , kwabena Sarpong , Chiagoziem Ukwuoma , Rutherford Patamia , Zhiguang Qin
{"title":"Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing","authors":"Jehoiada Jackson ,&nbsp;Kwame Obour Agyekum ,&nbsp;kwabena Sarpong ,&nbsp;Chiagoziem Ukwuoma ,&nbsp;Rutherford Patamia ,&nbsp;Zhiguang Qin","doi":"10.1016/j.cosrev.2024.100669","DOIUrl":"10.1016/j.cosrev.2024.100669","url":null,"abstract":"<div><p>The natural and artificial dispersal of climatic particles transforms images obtained in open-air conditions. Due to visibility diminishing aerosols, unfavorable climate situations such as mist, fog, and haze cause color change and reduce the contrast of the obtained image. Images seem deformed and inadequate in contrast saturation, affecting computer vision techniques considerably. Haze removal aims to decrease uncertainty inside a hazy image and enhance the visual effects for post-processing applications. However, dehazing is highly challenging due to its mathematical obscurity. This paper reviews the primary algorithms for image dehazing proposed over the past decade. The paper presents the basis for hazy image degradation, followed by a novel classification of dehazing algorithms into enhancement-based, joint-based, and Image repair methods. All techniques are evaluated, and the respective subsections are presented according to their attributes. Next, we categorize and elaborate on the various quality assessment methods using structural similarity index measure(SSIM), haze result, PSNR, and degradation score to evaluate some unique algorithms. Ultimately, some concerns about drawbacks and future research scope in haze removal methods are examined.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges 可重构智能表面辅助多接入边缘计算网络调查:技术现状与未来挑战
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-08-26 DOI: 10.1016/j.cosrev.2024.100668
Manzoor Ahmed , Salman Raza , Aized Amin Soofi , Feroz Khan , Wali Ullah Khan , Fang Xu , Symeon Chatzinotas , Octavia A. Dobre , Zhu Han
{"title":"A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges","authors":"Manzoor Ahmed ,&nbsp;Salman Raza ,&nbsp;Aized Amin Soofi ,&nbsp;Feroz Khan ,&nbsp;Wali Ullah Khan ,&nbsp;Fang Xu ,&nbsp;Symeon Chatzinotas ,&nbsp;Octavia A. Dobre ,&nbsp;Zhu Han","doi":"10.1016/j.cosrev.2024.100668","DOIUrl":"10.1016/j.cosrev.2024.100668","url":null,"abstract":"<div><p>This survey provides a comprehensive analysis of the integration of Reconfigurable Intelligent Surfaces (RIS) with edge computing, underscoring RIS’s critical role in advancing wireless communication networks. The examination begins by demystifying edge computing, contrasting it with traditional cloud computing, and categorizing it into several types. It further delves into advanced edge computing models like Multi-Access Edge Computing (MEC), Vehicle Fog Computing (VFC), and Vehicle Edge Computing (VEC) and challenges. Progressing deeper, the survey explores RIS technology, categorizing it into passive, active, and hybrid RIS, and offers an in-depth analysis of Beyond Diagonal RIS (BD-RIS), including reflective, transmissive, and Simultaneous Transmit and Reflect (STAR) modes. Subsequently, the study assesses RIS’s applications within edge computing, revealing its diverse use cases and strategies for performance analysis. The discussion comprises how RIS-driven computation can elevate rates, reduce latency, and contribute to an eco-friendly edge computing approach through better Energy Efficiency (EE). The survey also scrutinizes RIS’s role in bolstering security within edge computing. To aid comprehension, each subsection is complemented by summary tables that meticulously elaborate on, compare, and evaluate the literature, focusing on aspects like system models, scenarios, RIS details, Channel State Information (CSI), offloading types, employed schemes, methodologies, and proposed solutions. This organized approach ensures a cohesive and thorough exploration of the survey’s diverse topics. By illustrating the synergy between RIS and edge computing, the study provides valuable insights or lessons learned for enhancing wireless networks, paving the way for future breakthroughs in communication technologies. Before conclusion, the survey also identifies ongoing challenges and future research directions in RIS-assisted edge computing, emphasizing the vast potential of this field.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of blockchain, artificial intelligence, and edge computing for Web 3.0 针对 Web 3.0 的区块链、人工智能和边缘计算调查
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-08-24 DOI: 10.1016/j.cosrev.2024.100667
Jianjun Zhu, Fan Li, Jinyuan Chen
{"title":"A survey of blockchain, artificial intelligence, and edge computing for Web 3.0","authors":"Jianjun Zhu,&nbsp;Fan Li,&nbsp;Jinyuan Chen","doi":"10.1016/j.cosrev.2024.100667","DOIUrl":"10.1016/j.cosrev.2024.100667","url":null,"abstract":"<div><p>Web 3.0, as the third generation of the World Wide Web, aims to solve contemporary problems of trust, centralization, and data ownership. Driven by the latest advances in cutting-edge technologies, Web 3.0 is moving towards a more open, decentralized, intelligent, and interconnected network. Currently, increasingly widespread data breaches have raised awareness of online privacy and security of personal data. Additionally, since Web 3.0 is a complex integration, the technical details are not as clear as the characteristics it presents. In this survey, we conduct an in-depth exploration of Web 3.0 from the perspectives of blockchain, artificial intelligence, and edge computing. The methodology includes a comprehensive literature review, using specific keywords to identify relevant studies and applying strict inclusion and exclusion criteria to ensure a focus on high-quality literature. The main contributions include identifying the key challenges of Web 3.0, examining the fundamental role of each underlying technology, and surveying state-of-the-art practical applications within this ecosystem. Moreover, we introduce an innovative decentralized storage solution that facilitates secure communication and data processing without relying on centralized servers. We also introduce a novel decentralized computing solution that enhances the capabilities of Web 3.0 by enabling edge devices to perform data analysis locally, reducing dependence on traditional centralized servers. Finally, we highlight key challenges and potential research directions. Through the combination and mutual complementation of multiple technologies, Web 3.0 is expected to give users more control and ownership of data and digital assets.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142058577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive survey of text classification techniques and their research applications: Observational and experimental insights 全面考察文本分类技术及其研究应用:观察与实验启示
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-08-23 DOI: 10.1016/j.cosrev.2024.100664
Kamal Taha , Paul D. Yoo , Chan Yeun , Dirar Homouz , Aya Taha
{"title":"A comprehensive survey of text classification techniques and their research applications: Observational and experimental insights","authors":"Kamal Taha ,&nbsp;Paul D. Yoo ,&nbsp;Chan Yeun ,&nbsp;Dirar Homouz ,&nbsp;Aya Taha","doi":"10.1016/j.cosrev.2024.100664","DOIUrl":"10.1016/j.cosrev.2024.100664","url":null,"abstract":"<div><p>The exponential growth of textual data presents substantial challenges in management and analysis, notably due to high storage and processing costs. Text classification, a vital aspect of text mining, provides robust solutions by enabling efficient categorization and organization of text data. These techniques allow individuals, researchers, and businesses to derive meaningful patterns and insights from large volumes of text. This survey paper introduces a comprehensive taxonomy specifically designed for text classification based on research fields. The taxonomy is structured into hierarchical levels: research field-based category, research field-based sub-category, methodology-based technique, methodology sub-technique, and research field applications. We employ a dual evaluation approach: empirical and experimental. Empirically, we assess text classification techniques across four critical criteria. Experimentally, we compare and rank the methodology sub-techniques within the same methodology technique and within the same overall research field sub-category. This structured taxonomy, coupled with thorough evaluations, provides a detailed and nuanced understanding of text classification algorithms and their applications, empowering researchers to make informed decisions based on precise, field-specific insights.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013724000480/pdfft?md5=d276b7a8b6796ecd0218ecd68c33f3ff&pid=1-s2.0-S1574013724000480-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142045873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives 物联网异常检测的最新进展:现状、挑战和前景
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2024-08-22 DOI: 10.1016/j.cosrev.2024.100665
Deepak Adhikari , Wei Jiang , Jinyu Zhan , Danda B. Rawat , Asmita Bhattarai
{"title":"Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives","authors":"Deepak Adhikari ,&nbsp;Wei Jiang ,&nbsp;Jinyu Zhan ,&nbsp;Danda B. Rawat ,&nbsp;Asmita Bhattarai","doi":"10.1016/j.cosrev.2024.100665","DOIUrl":"10.1016/j.cosrev.2024.100665","url":null,"abstract":"<div><p>This paper provides a comprehensive survey of anomaly detection for the Internet of Things (IoT). Anomaly detection poses numerous challenges in IoT, with broad applications, including intrusion detection, fraud monitoring, cybersecurity, industrial automation, etc. Intensive attention has been received by network security analytics and researchers, particularly on anomaly detection in the network, deliberately crucial in network security. It is of critical importance to detect network anomalies timely. Due to various issues and resource-constrained features, conventional anomaly detection strategies cannot be implemented in the IoT. Hence, this paper attempts to highlight various recent techniques to detect anomalies in IoT and its applications. We also present anomalies at multiple layers of the IoT architecture. In addition, we discuss multiple computing platforms and highlight various challenges of anomaly detection. Finally, the potential future directions of the methods are suggested, leading to various open research issues to be analyzed afterward. With this survey, we hope that readers can get a better understanding of anomaly detection, as well as research trends in this domain.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142044588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信