Hemanth et al., 2023 - Google Patents
Intelligent Edge Computing for Cyber Physical ApplicationsHemanth et al., 2023
- Document ID
- 10927638499597214053
- Author
- Hemanth D
- Gupta B
- Elhoseny M
- Shinde S
- Publication year
External Links
Snippet
Intelligent Edge Computing for Cyber Physical Applications introduces state-of-the-art research methodologies, tools and techniques, challenges, and solutions with further research opportunities in the area of edge-based cyber-physical systems. The book …
- 238000000034 method 0 abstract description 121
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lohiya et al. | Application domains, evaluation data sets, and research challenges of IoT: A systematic review | |
| Aouedi et al. | A survey on intelligent Internet of Things: Applications, security, privacy, and future directions | |
| Hassan et al. | Differential privacy techniques for cyber physical systems: A survey | |
| Tuli et al. | Next generation technologies for smart healthcare: challenges, vision, model, trends and future directions | |
| Magara et al. | Internet of things (IoT) of smart homes: privacy and security | |
| Babiceanu et al. | Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook | |
| Faleiro et al. | Digital twin for cybersecurity: Towards enhancing cyber resilience | |
| Neeli et al. | Insight to security paradigm, research trend & statistics in internet of things (IoT) | |
| Khan et al. | A neutrosophic WPM-based machine learning model for device trust in industrial internet of things | |
| Ahad et al. | IoT data management—Security aspects of information linkage in IoT systems | |
| Nagarajan et al. | Security framework for IoT and deep belief network-based healthcare system using blockchain technology | |
| Denis et al. | A Survey on Artificial Intelligence and Blockchain Applications in Cybersecurity for Smart Cities | |
| Gupta et al. | Predictive computing and information security | |
| Sathish et al. | RETRACTED ARTICLE: A survey on Blockchain mechanisms (BCM) based on internet of things (IoT) applications | |
| Shirvanian et al. | Internet of Things data management: A systematic literature review, vision, and future trends | |
| Kamal et al. | Privacy and security federated reference architecture for Internet of Things | |
| Hemanth et al. | Intelligent Edge Computing for Cyber Physical Applications | |
| Ksibi et al. | MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT) | |
| Orumwense et al. | A systematic review to aligning research paths: Energy cyber-physical systems | |
| Zheng et al. | Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach | |
| You et al. | AI ethics in smart homes: progress, user requirements and challenges | |
| Saravanan et al. | Artificial intelligence security model for privacy renitence in big data analytics | |
| Padma et al. | A comprehensive review of lightweight blockchain practices for smart cities: A security and efficacy assessment | |
| Anyonyi et al. | The Role of AI in IoT Systems: A Semi-Systematic Literature Review | |
| Andrade et al. | Integration of AI and IoT approaches for evaluating cybersecurity risk on smart city |