2023
DOI: 10.1016/j.iswa.2023.200216
|View full text |Cite
|
Sign up to set email alerts
|

Secure edge computing vulnerabilities in smart cities sustainability using petri net and genetic algorithm-based reinforcement learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…Ajao et al [116] proposed a Blockchain-Based Machine Learning -Intrusion Detection System (BML-IDS) framework to protect networks for sustainable smart city fog computing. Data flow is detected and secured using blockchain and machine learning algorithms.…”
Section: ) Edge Computing and Fog Computingmentioning
confidence: 99%
“…Ajao et al [116] proposed a Blockchain-Based Machine Learning -Intrusion Detection System (BML-IDS) framework to protect networks for sustainable smart city fog computing. Data flow is detected and secured using blockchain and machine learning algorithms.…”
Section: ) Edge Computing and Fog Computingmentioning
confidence: 99%
“…Ajao and Apeh, 2023 [5] introduce a Petri net-genetic algorithm-based reinforcement learning (GARL) technique to address security issues in smart cities' Industrial Internet of Things (IIoT) networks. The framework includes a trust model and distributed authorization for information control, achieving high anomaly detection rates.…”
Section: Related Workmentioning
confidence: 99%
“…Threat Prevention: Threat prevention involves taking proactive measures to prevent cyber threats from becoming successful attacks [23]. This may include blocking unauthorized access, strengthening security, and taking preventive measures to reduce risks.…”
mentioning
confidence: 99%