2019 IEEE 4th International Conference on Big Data Analytics (ICBDA) 2019
DOI: 10.1109/icbda.2019.8713237
|View full text |Cite
|
Sign up to set email alerts
|

Use of Machine Learning in Detecting Network Security of Edge Computing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…In Reference [76], the advantage is efficient data handling and the disadvantages are time and space issues. Hou et al [54] proposed a security detecting network of edge computing systems using ML to solve the security problem. The advantages are providing secure data and improving security issues, and the disadvantages are network error and storage issues.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
See 2 more Smart Citations
“…In Reference [76], the advantage is efficient data handling and the disadvantages are time and space issues. Hou et al [54] proposed a security detecting network of edge computing systems using ML to solve the security problem. The advantages are providing secure data and improving security issues, and the disadvantages are network error and storage issues.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
“…With the expansion of general information in the cloud, there has likewise been an expansion of delicate information in the cloud, motivating the requirement for higher security in CC. This section describes methodologies proposed to improve cloud security using more accurate risk identification [54]. We begin by describing a general methodology to decide threats and dangers through the summation of hazard levels.…”
Section: And Cloud Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Once completed, (3) the results are compared between workers and the workplace to establish the appropriate design parameter, and (4) finally, when the design parameter has been selected, filters or amplifiers of variety are employed to adjust the Competences-Capacities between workers and the workplace. Each dimension that characterizes the enactive paradigm is defined by a set of variables that are identified through a questionnaire in the design phase and later in the work process through a set of sensors integrated in wearables, which are processed locally in real time (edge) to customize the environment for the worker [56,57] in the nearby environment (fog) and thus adjust to the worker the parameters of the surrogate model that allows the adaptation of the workplace to a particular worker through machine learning and other affective design algorithms [58]. Finally, data from sensors and wearables are sent to the cloud to update the surrogate model, adapting the work environment to the worker in an evolutionary way.…”
Section: Methods Techniques and Toolsmentioning
confidence: 99%
“…Figure 11 and Table 8 cover the various frameworks and algorithms in cloud, fog, and edge that have been collected from [56][57][58]82]. Firstly, this includes sensorization and data acquisition at the edge, followed by processing in fog, massive data ingestion, and its subsequent storage and treatment under cognitive computing.…”
Section: Case Studymentioning
confidence: 99%