2024
Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security.
IEEE Internet Things J., December, 2024
Privacy-Aware and AI Techniques for Healthcare Based on K-Anonymity Model in Internet of Things.
IEEE Trans. Engineering Management, 2024
Encryption as a Service for IoT: Opportunities, Challenges, and Solutions.
IEEE Internet Things J., 2024
Enhanced Efficiency in Fog Computing: A Fuzzy Data-Driven Machine Selection Strategy.
Int. J. Fuzzy Syst., 2024
A comprehensive survey on cyber deception techniques to improve honeypot performance.
Comput. Secur., 2024
Deploying Testbed Docker-based application for Encryption as a Service in Kubernetes.
Proceedings of the International Conference on Software, 2024
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024
Encryption as a Service: A Review of Architectures and Taxonomies.
Proceedings of the Distributed Applications and Interoperable Systems, 2024
2023
Hierarchical Clustering Based on Dendrogram in Sustainable Transportation Systems.
IEEE Trans. Intell. Transp. Syst., December, 2023
Setting up SLAs using a dynamic pricing model and behavior analytics in business and marketing strategies in cloud computing.
Pers. Ubiquitous Comput., December, 2023
Improving Resources in Internet of Vehicles Transportation Systems Using Markov Transition and TDMA Protocol.
IEEE Trans. Intell. Transp. Syst., November, 2023
Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023
Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure.
Clust. Comput., February, 2023
A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things.
Clust. Comput., February, 2023
DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments.
Clust. Comput., February, 2023
Mapping and embedding infrastructure resource management in software defined networks.
Clust. Comput., February, 2023
Toward a Secure Industrial Wireless Body Area Network Focusing MAC Layer Protocols: An Analytical Review.
IEEE Trans. Ind. Informatics, 2023
SCEMA: An SDN-Oriented Cost-Effective Edge-Based MTD Approach.
IEEE Trans. Inf. Forensics Secur., 2023
An intelligent energy-efficient approach for managing IoE tasks in cloud platforms.
J. Ambient Intell. Humaniz. Comput., 2023
An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers.
Comput. Commun., 2023
A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023
Enhancing 5G Network Slicing: Slice Isolation Via Actor-Critic Reinforcement Learning with Optimal Graph Features.
Proceedings of the IEEE Global Communications Conference, 2023
Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection.
Proceedings of the IEEE Global Communications Conference, 2023
2022
CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities.
Microprocess. Microsystems, April, 2022
Improving Quality of Service in 5G Resilient Communication with the Cellular Structure of Smartphones.
ACM Trans. Sens. Networks, 2022
GSAGA: A hybrid algorithm for task scheduling in cloud infrastructure.
J. Supercomput., 2022
Traffic flow control using multi-agent reinforcement learning.
J. Netw. Comput. Appl., 2022
A Cost-Effective MTD Approach for DDoS Attacks in Software-Defined Networks.
Proceedings of the IEEE Global Communications Conference, 2022
2021
An intelligent botnet blocking approach in software defined networks using honeypots.
J. Ambient Intell. Humaniz. Comput., 2021