Filters








55,865 Hits in 5.4 sec

Data science and AI in FinTech: An overview [article]

Longbing Cao, Qiang Yang, Philip S. Yu
2021 arXiv   pre-print
Smart FinTech synthesizes broad DSAI and transforms finance and economies to drive intelligent, automated, whole-of-business and personalized economic and financial businesses, services and systems.  ...  The research on data science and AI in FinTech involves many latest progress made in smart FinTech for BankingTech, TradeTech, LendTech, InsurTech, WealthTech, PayTech, RiskTech, cryptocurrencies, and  ...  -Clustering and classification: of large-scale behavioral data (e.g., human actions and interactions) and blockchain bitcoin networks; cloud-based scalable clustering; diffusion-based region clustering  ... 
arXiv:2007.12681v2 fatcat:jntzuwaktjg2hmmjypi5lvyht4

Spontaneous Virtual Networks: On the Road Towards the Internet´s Next GenerationSpontane Virtuelle Netze: Auf dem Weg zur nächsten Generation des Internets

Oliver P. Waldhorst, Christian Blankenhorn, Dirk Haage, Ralph Holz, Gerald G Koch, Boris Koldehofe, Fleming Lampi, Christoph P. Mayer, Sebastian Mies
2009 it - Information Technology  
SpoVNet´s architecture offers support for the underlay aware adaptation of overlays by the use of cross-layer information.  ...  We present Spontaneous Virtual Networks (SpoVNet), a methodology that enables easy development of new services with transparent support for mobility, multi-homing, and heterogeneous environments.  ...  Adaptation of overlay services is supported by providing cross-layer information of the underlying network.  ... 
doi:10.1524/itit.2008.0508 fatcat:55wvo3vlvje5xlurchwsr2za4i

A survey of intrusion detection techniques

Sharanya Chandran, K Senthil Kumar
2018 International Journal of Engineering & Technology  
Thus the applications are vulnerable to security issues like phishing attacks, denial of service attacks, cross-site scripting attack and many more.  ...  This paper provides literature review of work done in these areas and their respective mitigations.  ...  The subtle security issues an be avoided by managing the energy amoung various nodes in network.  ... 
doi:10.14419/ijet.v7i2.4.13036 fatcat:hzemt5imhbfr7ajvtguya3ixjy

HoliTrust -A Holistic Cross-Domain Trust Management Mechanism for Service-centric Internet of Things

Kamran Ahmad Awan, Ikram Ud Din, Mahdi Zareei, Muhammad Talha, Mohsen Guizani, Sultan Ullah Jadoon
2019 IEEE Access  
INDEX TERMS Trust management, holistic trust, cross-domain, IoT, security.  ...  To provide multilevel security, the HoliTrust divides domains into communities on the basis of similarities and interests.  ...  In 2018, a trust management model is proposed to provide the essential security for the cloud-based IoT framework [20] .  ... 
doi:10.1109/access.2019.2912469 fatcat:kmvz5n5ebbhfhcmyy4zi2dfxxu

A Knowledge Plane for Autonomic Context-Aware Wireless Mobile Ad Hoc Networks [chapter]

Daniel F. Macedo, Aldri L. dos Santos, José Marcos S. Nogueira, Guy Pujolle
2008 Lecture Notes in Computer Science  
, autonomic management solutions and context-aware services.  ...  The Knowledge Plane (KP) is a distributed entity that stores and disseminates information concerning the network, its services and the environment, orchestrating the collaboration among cross-layer protocols  ...  Acknowledgements We would like to thank CNPq, an organization from the Science and Technology Ministry of Brazil, for partially funding this research.  ... 
doi:10.1007/978-3-540-87359-4_1 fatcat:rkza2qmz4zb2nhf2uuywkorzyq

Smart and Cooperative Sensor Networks

Hongke Zhang, Sy-Yen Kuo, Sajal K. Das, Mikael Gidlund
2014 International Journal of Distributed Sensor Networks  
The paper "Energy-aware service composition algorithms for service-oriented heterogeneous wireless sensor networks" by T.  ...  During the last decade sensor networks have drawn significant interest for providing ubiquitous access to information anywhere and anytime.  ...  The paper "Energy-aware service composition algorithms for service-oriented heterogeneous wireless sensor networks" by T.  ... 
doi:10.1155/2014/789352 fatcat:qizqvcrfyfeqlf5jyaljyx5kye

Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques

Monika Darji, Bhushan Trivedi
2012 International Journal of Applied Information Systems  
Intrusion Detection and Prevention System is a must for mobile ad networks as the security mechanisms like encryption, authentication and firewall systems are not able to completely secure the nodes and  ...  In this paper, we aim to study the various intrusion detection and prevention systems that were proposed for Mobile Adhoc Networks (MANETs) and compare the recent techniques Intrusion Detection based on  ...  Providing security to the nodes and their data communication in such scenarios is critical.  ... 
doi:10.5120/ijais12-450153 fatcat:c5fp3hwlvjhvbe2embzfr6c7ry

EV Charging Behavior Analysis Using Hybrid Intelligence for 5G Smart Grid

Yi Shen, Wei Fang, Feng Ye, Michel Kadoch
2020 Electronics  
Due to the inherently high maneuverability of EVs, V2G systems must provide on-demand service for EVs.  ...  This architecture allows the bi-directional flow of power and information between schedulable EVs and smart grids (SGs) to improve the quality of service and cost-effectiveness of energy service providers  ...  Acknowledgments: Thanks to the editors and reviewers for their careful review, constructive suggestion, and reminding, which helped improve the quality of the paper.  ... 
doi:10.3390/electronics9010080 fatcat:rl3paioat5cvtn6qqv7p6vzxqi

Cross Layer Integrated Approach for Secured Cluster Selection in Ad Hoc Networks

D. N. Goswami, Anshu Chaturvedi
2012 International Journal of Computer and Communication Engineering  
We propose a secure and effective cluster-head Selection scheme using a cross-layer approach that integrates cluster-head discovery and selection functionality with network ad hoc routing mechanisms and  ...  This scheme allows clients to switch to better cluster-head nodes as network topology changes. Hence, provides better performance to network.  ...  This scheme allows clients to switch to better Cluster-head nodes as network topology changes. Hence, provides better performance to network.  ... 
doi:10.7763/ijcce.2012.v1.49 fatcat:osaedy6aznawxcuud2kcvckodq

5 Growth: Secure and Reliable Network Slicing for Verticals

Vitor A. Cunha, Nikolaos Maroulis, Chrysa Papagianni, Javier Sacido, Manuel Jimenez, Fabio Ubaldi, Molka Gharbaoui, Chia- Yu Chang, Nikolaos Koursioumpas, Konstantin Tomakh, Daniel Corujo, Joao P. Barraca (+9 others)
2021 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit)  
In this context, the H2020 5Growth project extends baseline 5G management and orchestration platforms to manage the life-cycle of real end-to-end, reliable, and secure network slices with performance guarantees  ...  In this paper, we present 5Growth's approaches to (i) attain isolation across network slices, (ii) provide secure interfaces towards third parties, and (iii) exploit AI/ML to achieve reliability through  ...  The 5Gr-SO enables resource and service orchestration and lifecycle management for the deployed network services.  ... 
doi:10.1109/eucnc/6gsummit51104.2021.9482536 fatcat:grazmvg7hng3jdhwoyk4abgwgi

A distributed IDS architecture model for Smart Home systems

Mariusz Gajewski, Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis
2017 Cluster Computing  
One of the solutions for gaining users' confidence is to assign responsibility for detecting attacks to the service provider, particularly Internet Service Provider (ISP).  ...  Sometimes taking control of one device allows the attacker to obtain secret data (such as password for home WiFi network) or tools to carry out DoS attack, and this, despite the limited resources of such  ...  Acknowledgements This work was undertaken under the PolLux IDSECOM project and the PolTur FUSE project supported by the National Centre for Research and Development (NCBiR) in Poland.  ... 
doi:10.1007/s10586-017-1105-z fatcat:iochloplrval5ji2oml26zqf5m

Cluster Node Migration Oriented Holistic Trust Management Protocol for Ubiquitous and Pervasive IoT Network

Anup Patnaik, Banitamani Mallik, M. Vamsi Krishna
2021 Journal of Information Technology Management  
Unless security considerations are analyzed and implemented properly in real time then IoT cannot be perceived as a pervasive network for the possible stakeholders.  ...  Smart applications with interconnected intelligent devices for sharing services arise serious security problems to the stability of this IoT complex and heterogeneous environment.  ...  set of nodes which going to stay for providing the service to service requester.  ... 
doi:10.22059/jitm.2021.80027 doaj:ddd7fb68f9914c01ad57da1f753da7c4 fatcat:4xxh5h5z7jfxhohocptjxbzb6e

Data science and AI in FinTech: an overview

Longbing Cao, Qiang Yang, Philip S. Yu
2021 International Journal of Data Science and Analytics  
Smart FinTech synthesizes broad DSAI and transforms finance and economies to drive intelligent, automated, whole-of-business and personalized economic and financial businesses, services and systems.  ...  The research on data science and AI in FinTech involves many latest progress made in smart FinTech for BankingTech, Trade-Tech, LendTech, InsurTech, WealthTech, PayTech, RiskTech, cryptocurrencies, and  ...  Smart credit/risk management offers efficient, personalized, active, evolving, secure and sustainable credit and risk valuation, products, services and management for business and customers.  ... 
doi:10.1007/s41060-021-00278-w fatcat:4qo3swacjbaaxh56p5bvhmjzqa

Cross-Domain Fine-Grained Data Usage Control Service for Industrial Wireless Sensor Networks

Jun Wu, Mianxiong Dong, Kaoru Ota, Muhammad Tariq, Longhua Guo
2015 IEEE Access  
control and fuzzy clustering for sensing data for efficient analysis.  ...  Therefore, the cross-domain fine-grained data usage is the core problem for this approach.  ...  Service Manager provides the centralized management of the original service and additional security services such as versioned, private and public service types in the sensor networks in the industrial  ... 
doi:10.1109/access.2015.2504541 fatcat:p56hcjt3ebfy3po2jytwiewnpa

A software platform for fractionated spacecraft

A. Dubey, W. Emfinger, A. Gokhale, G. Karsai, W. R. Otte, J. Parsons, C. Szabo, A. Coglio, E. Smith, P. Bose
2012 2012 IEEE Aerospace Conference  
Two cross-cutting aspects -multi-level security and multilayered fault management -are addressed at all levels of the architecture.  ...  The operating system provides primitives for concurrency, synchronization, and secure information flows; it also enforces application separation and resource management policies.  ...  Platform actors provide system-level services. There are a number of cross-cutting aspects in the architecture: resource management, fault management, and MLS.  ... 
doi:10.1109/aero.2012.6187334 fatcat:t6m24ful35ethjpyhjpssyhpia
« Previous Showing results 1 — 15 out of 55,865 results