Fuzziness based semi-supervised learning approach for intrusion detection system
Countering cyber threats, especially attack detection, is a challenging area of research in the
field of information assurance. Intruders use polymorphic mechanisms to masquerade the …
field of information assurance. Intruders use polymorphic mechanisms to masquerade the …
Blockchain's adoption in IoT: The challenges, and a way forward
The underlying technology of Bitcoin is blockchain, which was initially designed for financial
value transfer only. Nonetheless, due to its decentralized architecture, fault tolerance and …
value transfer only. Nonetheless, due to its decentralized architecture, fault tolerance and …
Cloud computing risk assessment: a systematic literature review
Cloud computing security is a broad research domain with a large number of concerns,
ranging from protecting hardware and platform technologies to protecting clouds data and …
ranging from protecting hardware and platform technologies to protecting clouds data and …
A manufacturing big data solution for active preventive maintenance
…, S Tang, D Li, S Wang, C Liu, H Abbas… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Industry 4.0 has become more popular due to recent developments in cyber-physical systems,
big data, cloud computing, and industrial wireless networks. Intelligent manufacturing has …
big data, cloud computing, and industrial wireless networks. Intelligent manufacturing has …
Controllable analog resistive switching and synaptic characteristics in ZrO2/ZTO bilayer memristive device for neuromorphic systems
The development of artificial synaptic devices is a crucial step for the realization of efficient
bio-inspired neuromorphic computing systems. In this work, the bilayer ZrO 2 /ZTO-based …
bio-inspired neuromorphic computing systems. In this work, the bilayer ZrO 2 /ZTO-based …
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a broad …
controlling and monitoring of the connected smart objects. IoT applications range over a broad …
Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges
Industrial systems always prefer to reduce their operational expenses. To support such
reductions, they need solutions that are capable of providing stability, fault tolerance, and …
reductions, they need solutions that are capable of providing stability, fault tolerance, and …
Gefitinib for oesophageal cancer progressing after chemotherapy (COG): a phase 3, multicentre, double-blind, placebo-controlled randomised trial
SJ Dutton, DR Ferry, JM Blazeby, H Abbas… - The lancet …, 2014 - thelancet.com
Background Evidence is scarce for the effectiveness of therapies for oesophageal cancer
progressing after chemotherapy, and no randomised trials have been reported. We aimed to …
progressing after chemotherapy, and no randomised trials have been reported. We aimed to …
Edge computing in IoT-based manufacturing
Edge computing extends the capabilities of computation, network connection, and storage
from the cloud to the edge of the network. It enables the application of business logic between …
from the cloud to the edge of the network. It enables the application of business logic between …
User-oriented virtual mobile network resource management for vehicle communications
Currently, advanced communications and networks greatly enhance user experiences and
have a major impact on all aspects of people's lifestyles in terms of work, society, and the …
have a major impact on all aspects of people's lifestyles in terms of work, society, and the …