1,156 Hits in 11.2 sec

Toward Scalable Systems for Big Data Analytics: A Technology Tutorial

Han Hu, Yonggang Wen, Tat-Seng Chua, Xuelong Li
2014 IEEE Access  
systems) over the past two decades.  ...  Recent technological advancements have led to a deluge of data from distinctive domains (e.g., health care and scientific sensors, user-generated data, Internet and financial companies, and supply chain  ...  A sensor-based data collection system is considered a cyber-physical system [67] .  ... 
doi:10.1109/access.2014.2332453 fatcat:6unxlocbmnhs7mfctlvphdyqtu

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
The ubiquitous use of IoT ranges from Industrial Control Systems (ICS) to e-Health, e-Commerce, smart cities, supply chain management, smart cars, Cyber Physical Systems (CPS) and a lot more.  ...  Such reliance on IoT is resulting in a significant amount of data to be generated, collected, processed and analyzed. The big data analytics is no doubt beneficial for business development.  ...  CPS (Cyber Physical System) installed in Iranian Nuclear Enrichment Facility was discovered in Windows-based systems to gain an initial foothold.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues

Maria Stoyanova, Yannis Nikoloudakis, Spyridon Panagiotakis, Evangelos Pallis, Evangelos K. Markakis
2020 IEEE Communications Surveys and Tutorials  
Therefore, the purpose of this paper is to identify and discuss the main issues involved in the complex process of IoT-based investigations, particularly all legal, privacy and cloud security challenges  ...  The recent advances in hardware and information technology have accelerated the deployment of billions of interconnected, smart and adaptive devices in critical infrastructures like health, transportation  ...  The authors propose a cognitive framework that is supposed to address the emerging cyber-security and privacy threats to CPS-IoT (IoTenabled Cyber Physical Systems) and critical infrastructure systems.  ... 
doi:10.1109/comst.2019.2962586 fatcat:crd72xiwnzekjkaf4xkrixvpsu

Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures

Ismail Butun, Patrik Osterberg, Houbing Song
2019 IEEE Communications Surveys and Tutorials  
Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks.  ...  with IoT is of a big concern to the scientific community.  ...  Security Proposals IoT enabled Cyber-Physical Human Systems (CPHS) are one of the main components of the new era's cyber cities.  ... 
doi:10.1109/comst.2019.2953364 fatcat:wi7zt3goknciplqc2nhgqdfdei

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
It has now converted into big cyber-crime rings with clear financial, political and personal motives [71] .  ...  Moreover, in a shared network infrastructure, assume if the personal data losses then who will own the responsibility, which is a big concern among the users.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Context-Awareness for Mobile Sensing: A Survey and Future Directions

Ozgur Yurur, Chi Harold Liu, Zhengguo Sheng, Victor C. M. Leung, Wilfrido Moreno, Kin K. Leung
2016 IEEE Communications Surveys and Tutorials  
The existence and awareness of the context provides the capability of being conscious of physical environments or situations around mobile device users.  ...  To this end, this paper surveys the literature over the period of 1991-2014 from the emerging concepts to applications of context-awareness in mobile platforms by providing up-to-date research and future  ...  In the following, we will provide details of key components and modeling processes of the system. A.  ... 
doi:10.1109/comst.2014.2381246 fatcat:tzbqt6k23va3tltwxwg5jgvel4

Deep Learning in Mobile and Wireless Networking: A Survey

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 IEEE Communications Surveys and Tutorials  
One potential solution is to resort to advanced machine learning techniques, in order to help manage the rise in data volumes and algorithm-driven applications.  ...  Upcoming 5G systems are evolving to support exploding mobile traffic volumes, real-time extraction of fine-grained analytics, and agile management of network resources, so as to maximize user experience  ...  This makes implementing deep learning in mobile systems feasible and accelerates the processing of mobile data streams. B.  ... 
doi:10.1109/comst.2019.2904897 fatcat:xmmrndjbsfdetpa5ef5e3v4xda

EG 2005 Tutorial on Mixed Realities in Inhabited Worlds [article]

Nadia Magnenat-Thalmann, Daniel Thalmann, Pascal Fua, Frederic Vexo, HyungSeok Kim
2005 Eurographics State of the Art Reports  
Outline of the tutorial 1.1 Concepts and State of the Art of mixed realities in inhabited worlds 1.1.1 Mixed Realities in inhabited worlds 1.1.2 Believability and Presence 1.2 Perception, Sensors and Immersive  ...  , an industrial project 1.3.4 Feeling presence in the treatment of social phobia 2.  ...  Acknowledgement Part of the work presented has been supported by the EU IST FP6 programme, in frame of the EU IST ENACTIVE ( project.  ... 
doi:10.2312/egt.20051050 fatcat:qlyopr6svbd3znv6afa64ehxcy

Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges

Saeid Abolfazli, Zohreh Sanaei, Ejaz Ahmed, Abdullah Gani, Rajkumar Buyya
2014 IEEE Communications Surveys and Tutorials  
The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based  ...  Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability.  ...  In order to increase the quality and efficiency of remote execution in virtual environment and avoid data input loss at application suspension stages, the system stores input events (reading a file, capturing  ... 
doi:10.1109/surv.2013.070813.00285 fatcat:77v7cyzdwrbonll45npxl4loxa

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, Andrew Martin
2019 IEEE Communications Surveys and Tutorials  
In this respect, the smart metering infrastructure (SMI) plays an important role in controlling, monitoring and managing multiple domains in the SG.  ...  This survey paper shows a brief overview of real cyber attack incidents in traditional energy networks and those targeting the smart metering network.  ...  Within the TPM, sensitive data is shielded based on different states of the system and then utilized in the blind processing.  ... 
doi:10.1109/comst.2019.2899354 fatcat:67bz5glcfbbldpqagxmhvy2ssm

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, Moussa Ayyash
2015 IEEE Communications Surveys and Tutorials  
More importantly, the layers are supposed to be run on resource-constrained devices while having a layer like ‗Service Composition' in SOA-based architecture takes rather a big fraction of the time and  ...  In addition, these models have been designed to address specific types of communication media such as WSNs.  ...  Cloud computing for the IoT Cloud computing (CC) offers a new management mechanism for big data that enables the processing of data and the extraction of valuable knowledge from it.  ... 
doi:10.1109/comst.2015.2444095 fatcat:5z42s2bulrhilenkh7vztnorfa

Survey on Multi-Access Edge Computing for Internet of Things Realization

Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, Tarik Taleb
2018 IEEE Communications Surveys and Tutorials  
This underscores the cardinal role of IoT on the journey towards the fifth generation (5G) of wireless communication systems.  ...  IoT technologies augmented with intelligent and big data analytics are expected to rapidly change the landscape of myriads of application domains ranging from health care to smart cities and industrial  ...  network of cyber-physical systems.  ... 
doi:10.1109/comst.2018.2849509 fatcat:fnksr3dbqfakzfvnopyyxjdlfm

A Communications-Oriented Perspective on Traffic Management Systems for Smart Cities: Challenges and Innovative Approaches

Soufiene Djahel, Ronan Doolan, Gabriel-Miro Muntean, John Murphy
2015 IEEE Communications Surveys and Tutorials  
road Traffic Management Systems (TMS) more efficient to cope with the above issues in future smart cities.  ...  The growing size of cities and increasing population mobility have determined a rapid increase in the number of vehicles on the roads, which has resulted in many challenges for road traffic management  ...  Parking Management Systems Another important service that results from data exploitation is parking management which is foreseen to play a key role in improving traffic congestion control and reducing  ... 
doi:10.1109/comst.2014.2339817 fatcat:ap7hvhawqrf7zb5noxm4ph5orq

The Virtual Object as a Major Element of the Internet of Things: A Survey

Michele Nitti, Virginia Pilloni, Giuseppe Colistra, Luigi Atzori
2016 IEEE Communications Surveys and Tutorials  
The Internet of Things (IoT) paradigm has been evolving towards the creation of a cyber-physical world where everything can be found, activated, probed, interconnected, and updated, so that any possible  ...  This paper aims at providing the reader with a survey of the virtual object in the IoT world.  ...  Acknowledgment This work has been partially supported by the projects SocialMobility, funded by the workprogramme "P.O.R.  ... 
doi:10.1109/comst.2015.2498304 fatcat:amodimpwf5hjxg7r2jhhsdybr4

Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions

David Eckhoff, Isabel Wagner
2018 IEEE Communications Surveys and Tutorials  
Based on our taxonomies, we describe existing privacy-enhancing technologies, review the state of the art in real cities around the world, and discuss promising future research directions.  ...  We therefore systematize the application areas, enabling technologies, privacy types, attackers and data sources for the attacks, giving structure to the fuzzy term "smart city".  ...  ACKNOWLEDGMENT We would like to thank the anonymous reviewers for their insightful and in-depth comments which have helped to greatly improve the paper.  ... 
doi:10.1109/comst.2017.2748998 fatcat:q2iwcfkjevgrpe7vjxt5ugvrjy
« Previous Showing results 1 — 15 out of 1,156 results