Leveraging artificial intelligence and mutual authentication to optimize content caching in edge data centers
-
Published:2023-10
Issue:9
Volume:35
Page:101742
-
ISSN:1319-1578
-
Container-title:Journal of King Saud University - Computer and Information Sciences
-
language:en
-
Short-container-title:Journal of King Saud University - Computer and Information Sciences
Author:
Marwan MbarekORCID, AlShahwan Feda, Afoudi Yassine, Ait Temghart Abdelkarim, Lazaar Mohamed
Subject
General Computer Science
Reference71 articles.
1. Abdalla, M., Fouque, P.A., Pointcheval, D., 2005. Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (eds) Public Key Cryptography - PKC 2005. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, vol. 3386, pp. 65–84. 2. Features dimensionality reduction approaches for machine learning based network intrusion detection;Abdulhammed;Electronics,2019 3. Two factor authentication protocol for IoT based healthcare monitoring system;Agrahari;Journal of Ambient Intelligence and Humanized Computing.,2022 4. Ahmadi, S.S., Rashad, S., Elgazzar, H., 2019. Efficient feature selection for intrusion detection systems. In: Proceedings of International Conference on IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, pp. 1029-1034. 5. Al-Imran, M., Ripon, S.H., 2021. Network intrusion detection: an analytical assessment using deep learning and state-of-the-art machine learning models. International Journal of Computational Intelligence Systems. 14, Article number 200.
|
|