Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Blockchain (2)
- Internet of Things (2)
- Mobile Computing (2)
- Authentication (1)
- Computer engineering (1)
-
- Context-aware (1)
- Data Mining (1)
- Data Reliability (1)
- Electrical and computer engineering (1)
- Information Filtering (1)
- Information security (1)
- Lightweight (1)
- Location Privacy (1)
- Location-Based Social Network (1)
- Mobile Sensor (1)
- Numerical analysis and scientific computing (1)
- Os and networks (1)
- Point-of-Interest Recommendation (1)
- Recommendation System (1)
- Reputation (1)
- Smart grid security machine learning signal convolution (1)
- Social Network Analysis (1)
- Software engineering (1)
- Spatial (1)
- Statistics and probability (1)
- Storage (1)
- Temporal (1)
- Theory and algorithms (1)
- Trajectory (1)
- Zero knowledge proofs (1)
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim
Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim
FIU Electronic Theses and Dissertations
Internet of Things (IoT) is a critically important technology for the acquisition of spatiotemporally dense data in diverse applications, ranging from environmental monitoring to surveillance systems. Such data helps us improve our transportation systems, monitor our air quality and the spread of diseases, respond to natural disasters, and a bevy of other applications. However, IoT sensor data is error-prone due to a number of reasons: sensors may be deployed in hazardous environments, may deplete their energy resources, have mechanical faults, or maybe become the targets of malicious attacks by adversaries. While previous research has attempted to improve the quality of …
Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid
Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid
FIU Electronic Theses and Dissertations
Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity …
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
FIU Electronic Theses and Dissertations
With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …
Centralized And Distributed Detection Of Compromised Smart Grid Devices Using Machine Learning And Convolution Techniques, Cengiz Kaygusuz
Centralized And Distributed Detection Of Compromised Smart Grid Devices Using Machine Learning And Convolution Techniques, Cengiz Kaygusuz
FIU Electronic Theses and Dissertations
The smart grid concept has further transformed the traditional power grid into a massive cyber-physical system that depends on advanced two-way communication infrastructure. While the introduction of cyber components has improved the grid, it has also broadened the attack surface. In particular, the threat stemming from compromised devices pose a significant danger: An attacker can control the devices to change the behavior of the grid and can impact the measurements or damage the grid equipment. In this thesis, to detect such malicious smart grid devices, we propose a novel machine learning and convolution-based framework, named PowerWatch, that is able to …
Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi
Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi
FIU Electronic Theses and Dissertations
It has become a dominant trend in industry to adopt cloud computing --thanks to its unique advantages in flexibility, scalability, elasticity and cost efficiency -- for providing online cloud services over the Internet using large-scale data centers. In the meantime, the relentless increase in demand for affordable and high-quality cloud-based services, for individuals and businesses, has led to tremendously high power consumption and operating expense and thus has posed pressing challenges on cloud service providers in finding efficient resource allocation policies.
Allowing several services or Virtual Machines (VMs) to commonly share the cloud's infrastructure enables cloud providers to optimize resource …
Context-Aware Personalized Point-Of-Interest Recommendation System, Ramesh Raj Baral
Context-Aware Personalized Point-Of-Interest Recommendation System, Ramesh Raj Baral
FIU Electronic Theses and Dissertations
The increasing volume of information has created overwhelming challenges to extract the relevant items manually. Fortunately, the online systems, such as e-commerce (e.g., Amazon), location-based social networks (LBSNs) (e.g., Facebook) among many others have the ability to track end users' browsing and consumption experiences. Such explicit experiences (e.g., ratings) and many implicit contexts (e.g., social, spatial, temporal, and categorical) are useful in preference elicitation and recommendation. As an emerging branch of information filtering, the recommendation systems are already popular in many domains, such as movies (e.g., YouTube), music (e.g., Pandora), and Point-of-Interest (POI) (e.g., Yelp).
The POI domain has many …