2020
DOI: 10.1109/access.2020.3030726
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Enabled Data Offloading With Cyber Attack Detection Model in Mobile Edge Computing Systems

Abstract: Mobile edge computing (MEC) becomes popular as it offers cloud services and functionalities to the edge devices, to enhance the quality of service (QoS) of end-users by offloading their computationally intensive tasks. At the same time, the rise in the number of internet of things (IoT) objectives poses considerable cybersecurity issues owing to the latest rise in the existence of attacks. Presently, the development of deep learning and hardware technologies offers a way to detect the present traffic condition… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 23 publications
(35 reference statements)
0
13
0
Order By: Relevance
“…r 1 , j , r j < pr s or j = j 1 soc p,t r 2 j , r j ≥ pr s + pr a or j = j 2 σ j , O.W . (7) where r j ∈ [0, 1] denotes arbitrary values and r 2 indicates an arbitrary coyote in the group p, σ j defines an arbitrary value in the design variable limits, j 1 and j 2 are arbitrary design variables, and pr a and pr s signify the association and scatter probability which declares the coyote cultural diversity from the group. The pr a and pr s can be mathematically defined here's:…”
Section: Feature Selection Using Ocoa Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…r 1 , j , r j < pr s or j = j 1 soc p,t r 2 j , r j ≥ pr s + pr a or j = j 2 σ j , O.W . (7) where r j ∈ [0, 1] denotes arbitrary values and r 2 indicates an arbitrary coyote in the group p, σ j defines an arbitrary value in the design variable limits, j 1 and j 2 are arbitrary design variables, and pr a and pr s signify the association and scatter probability which declares the coyote cultural diversity from the group. The pr a and pr s can be mathematically defined here's:…”
Section: Feature Selection Using Ocoa Techniquementioning
confidence: 99%
“…A P2P electricity trading's among electric vehicles (EVs) are presented for reducing the impacts of EV charging on peak power. A complete P2P market framework for bilateral electricity trading amongst market performers according to their preference [7].…”
Section: Introductionmentioning
confidence: 99%
“…W (1) represents the hidden output weight matrix. Mainly, RNN is utilized in handling the problems related to order input and output.…”
Section: Phase Ii: Data Classificationmentioning
confidence: 99%
“…Cybersecurity is a phenomenon comprised of a group of processes, methodologies, policies, and technologies which collaborate together to protect the availability, confidentiality, and integrity of software programs, computing resources, network, and data from different types of attacks [1]. Cyber defense mechanism exists at network, data, application and host level.…”
Section: Introductionmentioning
confidence: 99%
“…However, existing machine learning-based security systems inevitably have to learn the data, which is directly related to the problems of the size and complexity of data. An attack on the network essentially requires an immediate or preemptive response in terms of availability [10]. Nowadays, the computing environment and the amount of data collected are beyond what can be processed in realtime.…”
Section: Introductionmentioning
confidence: 99%