Console 发表于 2025-3-25 04:33:50
http://reply.papertrans.cn/87/8633/863286/863286_21.pnghyperuricemia 发表于 2025-3-25 09:04:59
Big Data Analytics for Secure Edge-Based Manufacturing Internet of Things (MIoT)generating huge amounts of data. On the other hand, big data analysis plays an important role in today’s emerging world. The manufacturing of IoT plays a significant role in the manufacturing industry and similar to any other field, big amounts of data are generated in the manufacturing process thatpacket 发表于 2025-3-25 12:18:02
http://reply.papertrans.cn/87/8633/863286/863286_23.png帐单 发表于 2025-3-25 17:25:19
Machine Learning Techniques for Secure Edge SDN network abstraction. SDN is an innovative paradigm that enables the development of new and more efficient security services. This chapter provides an overview of the software-defined networking paradigm. The challenge of this chapter is twofold: On the one hand, to study and explore the contributioBombast 发表于 2025-3-25 23:54:33
Machine Learning–Based Identity and Access Management for Cloud Securityoviders to plan far in advance for hardware provisioning. Security remains a significant challenge in promoting cloud computing, but artificial intelligence (AI) can improve cloud services by enhancing security features. The privacy issue arises from the multiple data storage locations and availableEngulf 发表于 2025-3-26 00:11:15
http://reply.papertrans.cn/87/8633/863286/863286_26.png轿车 发表于 2025-3-26 06:49:14
Smart City Infrastructure Projects: Spatial Data of Risks used in the management of infrastructure projects. The application of graph modelling methods for proactive management of smart city infrastructure implementation, taking into account spatial risk data, is justified.尖 发表于 2025-3-26 10:05:57
http://reply.papertrans.cn/87/8633/863286/863286_28.png吸气 发表于 2025-3-26 15:21:04
Delay Prediction in M2M Networks Using the Deep Learning Approachrity risks could result from the insufficient analysis of the growing M2M traffic. In this chapter, we apply deep learning based on a long short-term memory (LSTM) model to implement time-series prediction of M2M traffic. The mean absolute percentage error (MAPE) and the root mean square error (RMSE) were used to evaluate the prediction accuracy.圆桶 发表于 2025-3-26 20:47:53
Book 2024nd fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and