2022
DOI: 10.32604/cmc.2022.025204
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems

Abstract: Mobile edge computing (MEC) provides effective cloud services and functionality at the edge device, to improve the quality of service (QoS) of end users by offloading the high computation tasks. Currently, the introduction of deep learning (DL) and hardware technologies paves a method in detecting the current traffic status, data offloading, and cyberattacks in MEC. This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC (AIMDO-SMEC) systems. The propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…The first step discussed above i.e., attaining the feature indication in which fruitful information regarding the URL is saved in a vector so that the ML methods can be implied to it. Several kinds of features have been assumed earlier such as content features, lexical features, popular features, and host-based features [9,10]. However, lexical features are the most widely used features as they have proved to yield superior outcomes and are comparatively simple to attain [11].…”
Section: Introductionmentioning
confidence: 99%
“…The first step discussed above i.e., attaining the feature indication in which fruitful information regarding the URL is saved in a vector so that the ML methods can be implied to it. Several kinds of features have been assumed earlier such as content features, lexical features, popular features, and host-based features [9,10]. However, lexical features are the most widely used features as they have proved to yield superior outcomes and are comparatively simple to attain [11].…”
Section: Introductionmentioning
confidence: 99%
“…Numerous current policies were offered for presenting energy efficient (EE) routing in WSNs. But, clustering-related protocols were mostly used for routing [9,10]. The energy can be effectively used when sending the data packets to the BS.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the privacy and security methods advanced by authors were intended to ensure security measures on the IoD network [10,11]. The approaches focused on mitigating problems which influence the secure localization of drones or privacy and security necessities linked with the IoD network system.…”
Section: Introductionmentioning
confidence: 99%