• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643049)   Today's Articles (2393)   Subscriber (50547)
For: Kayes ASM, Kalaria R, Sarker IH, Islam MS, Watters PA, Ng A, Hammoudeh M, Badsha S, Kumara I. A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues. Sensors (Basel) 2020;20:s20092464. [PMID: 32349242 PMCID: PMC7249653 DOI: 10.3390/s20092464] [Citation(s) in RCA: 34] [Impact Index Per Article: 8.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/19/2020] [Revised: 04/12/2020] [Accepted: 04/21/2020] [Indexed: 11/16/2022]
Number Cited by Other Article(s)
1
Shan D, Du X, Wang W, Liu A, Wang N. A Weighted GraphSAGE-Based Context-Aware Approach for Big Data Access Control. BIG DATA 2024;12:390-411. [PMID: 37527185 DOI: 10.1089/big.2021.0473] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/03/2023]
2
Hu T, Yang S, Wang Y, Li G, Wang Y, Wang G, Yin M. N-Accesses: A Blockchain-Based Access Control Framework for Secure IoT Data Management. SENSORS (BASEL, SWITZERLAND) 2023;23:8535. [PMID: 37896628 PMCID: PMC10610556 DOI: 10.3390/s23208535] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/16/2023] [Revised: 10/06/2023] [Accepted: 10/10/2023] [Indexed: 10/29/2023]
3
Novel intelligent architecture and approximate solution for future networks. PLoS One 2023;18:e0278183. [PMID: 36857320 PMCID: PMC9977064 DOI: 10.1371/journal.pone.0278183] [Citation(s) in RCA: 3] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/02/2022] [Accepted: 11/11/2022] [Indexed: 03/02/2023]  Open
4
Berhoum A, Meftah MCE, Laouid A, Hammoudeh M. An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks. ACM T ASIAN LOW-RESO 2023. [DOI: 10.1145/3575802] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/21/2023]
5
A Trusted Resource Allocation Scheme in Fog Environment to Satisfy High Network Demand. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2022. [DOI: 10.1007/s13369-022-07384-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/02/2022]
6
InteliRank: A Four-Pronged Agent for the Intelligent Ranking of Cloud Services Based on End-Users' Feedback. SENSORS 2022;22:s22124627. [PMID: 35746414 PMCID: PMC9227225 DOI: 10.3390/s22124627] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/17/2022] [Revised: 06/14/2022] [Accepted: 06/17/2022] [Indexed: 02/01/2023]
7
A Secure Mutual authentication approach to fog computing environment. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102483] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
8
The Impact of Artificial Intelligence on Data System Security: A Literature Review. SENSORS 2021;21:s21217029. [PMID: 34770336 PMCID: PMC8586986 DOI: 10.3390/s21217029] [Citation(s) in RCA: 14] [Impact Index Per Article: 4.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/31/2021] [Revised: 09/29/2021] [Accepted: 10/21/2021] [Indexed: 11/16/2022]
9
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud. SENSORS 2021;21:s21206821. [PMID: 34696034 PMCID: PMC8539666 DOI: 10.3390/s21206821] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/04/2021] [Revised: 09/24/2021] [Accepted: 10/08/2021] [Indexed: 11/18/2022]
10
Business Intelligence: Business Evolution after Industry 4.0. SUSTAINABILITY 2021. [DOI: 10.3390/su131810026] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/16/2022]
11
Method to Increase Dependability in a Cloud-Fog-Edge Environment. SENSORS 2021;21:s21144714. [PMID: 34300454 PMCID: PMC8309580 DOI: 10.3390/s21144714] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/11/2021] [Revised: 06/28/2021] [Accepted: 07/07/2021] [Indexed: 11/23/2022]
12
Prioritized Task Distribution Considering Opportunistic Fog Computing Nodes. SENSORS 2021;21:s21082635. [PMID: 33918614 PMCID: PMC8069752 DOI: 10.3390/s21082635] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/21/2021] [Revised: 04/04/2021] [Accepted: 04/07/2021] [Indexed: 11/23/2022]
13
Zhou J, Feng Y, Wang Z, Guo D. Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain. SENSORS 2021;21:s21041540. [PMID: 33672175 PMCID: PMC7927103 DOI: 10.3390/s21041540] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/25/2021] [Revised: 02/16/2021] [Accepted: 02/19/2021] [Indexed: 11/16/2022]
14
Liao Z, Pang X, Zhang J, Xiong B, Wang J. Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2021. [DOI: 10.1109/tnsm.2021.3122147] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
15
An Empirical Analysis of Test Input Generation Tools for Android Apps through a Sequence of Events. Symmetry (Basel) 2020. [DOI: 10.3390/sym12111894] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
16
A Safe-Region Imputation Method for Handling Medical Data with Missing Values. Symmetry (Basel) 2020. [DOI: 10.3390/sym12111792] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
17
Ling X, Gao Z, Le Y, You L, Wang J, Ding Z, Gao X. Satellite-Aided Consensus Protocol for Scalable Blockchains. SENSORS 2020;20:s20195616. [PMID: 33019567 PMCID: PMC7583979 DOI: 10.3390/s20195616] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/30/2020] [Revised: 09/25/2020] [Accepted: 09/26/2020] [Indexed: 11/28/2022]
18
Lee DH, Lee IY. A Lightweight Authentication and Key Agreement Schemes for IoT Environments. SENSORS 2020;20:s20185350. [PMID: 32961979 PMCID: PMC7570713 DOI: 10.3390/s20185350] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/10/2020] [Revised: 09/16/2020] [Accepted: 09/16/2020] [Indexed: 11/18/2022]
19
Towards a Formal IoT Security Model. Symmetry (Basel) 2020. [DOI: 10.3390/sym12081305] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
20
Katsikas S, Gkioulos V. Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things. SENSORS 2020;20:s20143846. [PMID: 32664194 PMCID: PMC7412190 DOI: 10.3390/s20143846] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Subscribe] [Scholar Register] [Received: 07/05/2020] [Accepted: 07/08/2020] [Indexed: 11/19/2022]
21
Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow. INFORMATION 2020. [DOI: 10.3390/info11070356] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/28/2022]  Open
22
A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures. COMPUTERS 2020. [DOI: 10.3390/computers9020044] [Citation(s) in RCA: 22] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA