Intelligent and Pervasive Computing for Cyber-Physical Systems
ISSN:
0920-8542 (Print)
1573-0484 (Online)
In this topical collection (26 articles)
-
OriginalPaper
A dynamic priority strategy for IoV data scheduling towards key data
Chenxi Huang, Hao Wang, Dong Guo, Guokai Zhang, Gaowei Xu… Pages 2018-2032 -
OriginalPaper
Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks
Shaohua Wan, Xiang Li, Yuan Xue, Wenmin Lin, Xiaolong Xu Pages 2518-2547 -
OriginalPaper
A context-aware encryption protocol suite for edge computing-based IoT devices
Zaineb Dar, Adnan Ahmad, Farrukh Aslam Khan, Furkh Zeshan… Pages 2548-2567 -
OriginalPaper
An ANFIS-based compatibility scorecard for IoT integration in websites
Akshi Kumar, Anshika Arora Pages 2568-2596 -
OriginalPaper
Vulnerability assessment method for cyber-physical system considering node heterogeneity
Bo Wang, Hengrui Ma, Xunting Wang, Guiping Deng, Yan Yang… Pages 2622-2642 -
OriginalPaper
Securing smart vehicles from relay attacks using machine learning
Usman Ahmad, Hong Song, Awais Bilal, Mamoun Alazab… Pages 2665-2682 -
OriginalPaper
Exemplar-based data stream clustering toward Internet of Things
Yizhang Jiang, Anqi Bi, Kaijian Xia, Jing Xue… Pages 2929-2957 -
EditorialNotes
Intelligent and pervasive computing for cyber-physical systems
Mohammad R. Khosravi, Varun G. Menon Pages 5237-5238 -
OriginalPaper
K-means tree: an optimal clustering tree for unsupervised learning
Pooya Tavallali, Peyman Tavallali, Mukesh Singhal Pages 5239-5266 -
OriginalPaper
A survey of local differential privacy for securing internet of vehicles
Ping Zhao, Guanglin Zhang, Shaohua Wan, Gaoyang Liu… Pages 8391-8412 -
OriginalPaper
Low-cohesion differential privacy protection for industrial Internet
Jun Hou, Qianmu Li, Shicheng Cui, Shunmei Meng… Pages 8450-8472 -
OriginalPaper
Cryptosystem design based on Hermitian curves for IoT security
Omar A. Alzubi, Jafar A. Alzubi, Osama Dorgham… Pages 8566-8589 -
OriginalPaper
Incorporating evolutionary computation for securing wireless network against cyberthreats
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi Pages 8691-8728 -
OriginalPaper
Interactive capacitive touch music table with embedded microcontrollers
Bassam Shaer, Lesley Ray, Jacob McBee, Anthony Graham… Pages 8845-8865
Continue reading...
To view the rest of this content please follow the download PDF link above.