2018 International Conference on High Performance Computing &Amp; Simulation (HPCS) 2018
DOI: 10.1109/hpcs.2018.00116
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(34 citation statements)
references
References 9 publications
0
34
0
Order By: Relevance
“…Once completed, (3) the results are compared between workers and the workplace to establish the appropriate design parameter, and (4) finally, when the design parameter has been selected, filters or amplifiers of variety are employed to adjust the Competences-Capacities between workers and the workplace. Each dimension that characterizes the enactive paradigm is defined by a set of variables that are identified through a questionnaire in the design phase and later in the work process through a set of sensors integrated in wearables, which are processed locally in real time (edge) to customize the environment for the worker [56,57] in the nearby environment (fog) and thus adjust to the worker the parameters of the surrogate model that allows the adaptation of the workplace to a particular worker through machine learning and other affective design algorithms [58]. Finally, data from sensors and wearables are sent to the cloud to update the surrogate model, adapting the work environment to the worker in an evolutionary way.…”
Section: Methods Techniques and Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Once completed, (3) the results are compared between workers and the workplace to establish the appropriate design parameter, and (4) finally, when the design parameter has been selected, filters or amplifiers of variety are employed to adjust the Competences-Capacities between workers and the workplace. Each dimension that characterizes the enactive paradigm is defined by a set of variables that are identified through a questionnaire in the design phase and later in the work process through a set of sensors integrated in wearables, which are processed locally in real time (edge) to customize the environment for the worker [56,57] in the nearby environment (fog) and thus adjust to the worker the parameters of the surrogate model that allows the adaptation of the workplace to a particular worker through machine learning and other affective design algorithms [58]. Finally, data from sensors and wearables are sent to the cloud to update the surrogate model, adapting the work environment to the worker in an evolutionary way.…”
Section: Methods Techniques and Toolsmentioning
confidence: 99%
“…Figure 11 and Table 8 cover the various frameworks and algorithms in cloud, fog, and edge that have been collected from [56][57][58]82]. Firstly, this includes sensorization and data acquisition at the edge, followed by processing in fog, massive data ingestion, and its subsequent storage and treatment under cognitive computing.…”
Section: Case Studymentioning
confidence: 99%
“…Among several RL techniques, Q-learning requires low computational resources for its implementation and does not require the knowledge of the model of the environment, thus being a suitable learning technique for the resource-constrained fog nodes [29]. Furthermore, Q-learning has been used extensively to address resource allocation problems [30], thus being a suitable learning technique for the problem.…”
Section: B Proposed Resource Allocation Mechanismmentioning
confidence: 99%
“…Lately, detection methods based on ensemble methods and deep learning approaches have emerged as prevalent detection techniques. In [8], authors provided a comprehensive study on the various machine learning techniques like Decision Tree, KNN, Random Forest, etc. and how machine learning based intrusion detection techniques at fog layer are capable of detecting abnormalities or attack.…”
Section: Introductionmentioning
confidence: 99%