[go: up one dir, main page]

Hemanth et al., 2023 - Google Patents

Intelligent Edge Computing for Cyber Physical Applications

Hemanth et al., 2023

Document ID
10927638499597214053
Author
Hemanth D
Gupta B
Elhoseny M
Shinde S
Publication year

External Links

Snippet

Intelligent Edge Computing for Cyber Physical Applications introduces state-of-the-art research methodologies, tools and techniques, challenges, and solutions with further research opportunities in the area of edge-based cyber-physical systems. The book …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Similar Documents

Publication Publication Date Title
Lohiya et al. Application domains, evaluation data sets, and research challenges of IoT: A systematic review
Aouedi et al. A survey on intelligent Internet of Things: Applications, security, privacy, and future directions
Hassan et al. Differential privacy techniques for cyber physical systems: A survey
Tuli et al. Next generation technologies for smart healthcare: challenges, vision, model, trends and future directions
Magara et al. Internet of things (IoT) of smart homes: privacy and security
Babiceanu et al. Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook
Faleiro et al. Digital twin for cybersecurity: Towards enhancing cyber resilience
Neeli et al. Insight to security paradigm, research trend & statistics in internet of things (IoT)
Khan et al. A neutrosophic WPM-based machine learning model for device trust in industrial internet of things
Ahad et al. IoT data management—Security aspects of information linkage in IoT systems
Nagarajan et al. Security framework for IoT and deep belief network-based healthcare system using blockchain technology
Denis et al. A Survey on Artificial Intelligence and Blockchain Applications in Cybersecurity for Smart Cities
Gupta et al. Predictive computing and information security
Sathish et al. RETRACTED ARTICLE: A survey on Blockchain mechanisms (BCM) based on internet of things (IoT) applications
Shirvanian et al. Internet of Things data management: A systematic literature review, vision, and future trends
Kamal et al. Privacy and security federated reference architecture for Internet of Things
Hemanth et al. Intelligent Edge Computing for Cyber Physical Applications
Ksibi et al. MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT)
Orumwense et al. A systematic review to aligning research paths: Energy cyber-physical systems
Zheng et al. Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach
You et al. AI ethics in smart homes: progress, user requirements and challenges
Saravanan et al. Artificial intelligence security model for privacy renitence in big data analytics
Padma et al. A comprehensive review of lightweight blockchain practices for smart cities: A security and efficacy assessment
Anyonyi et al. The Role of AI in IoT Systems: A Semi-Systematic Literature Review
Andrade et al. Integration of AI and IoT approaches for evaluating cybersecurity risk on smart city