小说 发表于 2025-3-30 09:13:30

Vadim Kovolenko,Abdelhamied A. Ateya,Ammar Muthanna,Andrey Koucheryavy

Coma704 发表于 2025-3-30 15:40:02

http://reply.papertrans.cn/87/8633/863286/863286_52.png

Fantasy 发表于 2025-3-30 18:15:33

Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities Includes selected Pa

agonist 发表于 2025-3-30 22:02:41

Service Migration Algorithm for UAV Recharge Zones in Future 6G Network Also useful is information on possible ways to implement the SDN controller. The presented algorithm (sequence of actions) for the implementation of the migration of services and the movement of the UAV to the recharge zones in the future can be applied in practice when the charge of the built-in U

搬运工 发表于 2025-3-31 03:37:01

Machine Learning–Based Identity and Access Management for Cloud Securityel uses AI to identify users’ identities and restricts malicious access to cloud services, and it was trained based on CloudSim-generated datasets. Quality of services (QoS) was used to measure the architecture’s efficiency, and the results showed that the proposed architecture was effective and fru

缝纫 发表于 2025-3-31 05:05:32

http://reply.papertrans.cn/87/8633/863286/863286_56.png

套索 发表于 2025-3-31 10:27:53

2522-8595book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022)..978-3-031-51099-1978-3-031-51097-7Series ISSN 2522-8595 Series E-ISSN 2522-8609

提名的名单 发表于 2025-3-31 15:22:46

http://reply.papertrans.cn/87/8633/863286/863286_58.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities ; Includes selected Pa Ahmed A. Abd El-Latif,Lo’ai Tawalbeh,Brij B. Gupta