scispace - formally typeset
Search or ask a question
JournalISSN: 2168-6750

IEEE Transactions on Emerging Topics in Computing 

Institute of Electrical and Electronics Engineers
About: IEEE Transactions on Emerging Topics in Computing is an academic journal published by Institute of Electrical and Electronics Engineers. The journal publishes majorly in the area(s): Computer science & Cloud computing. It has an ISSN identifier of 2168-6750. Over the lifetime, 783 publications have been published receiving 20594 citations. The journal is also known as: ITETBT & IEEE TETC.


Papers
More filters
Journal ArticleDOI
TL;DR: Concepts and algorithms related to clustering, a concise survey of existing (clustering) algorithms as well as a comparison, both from a theoretical and an empirical perspective are introduced.
Abstract: Clustering algorithms have emerged as an alternative powerful meta-learning tool to accurately analyze the massive volume of data generated by modern applications. In particular, their main goal is to categorize data into clusters such that objects are grouped in the same cluster when they are similar according to specific metrics. There is a vast body of knowledge in the area of clustering and there has been attempts to analyze and categorize them for a larger number of applications. However, one of the major issues in using clustering algorithms for big data that causes confusion amongst practitioners is the lack of consensus in the definition of their properties as well as a lack of formal categorization. With the intention of alleviating these problems, this paper introduces concepts and algorithms related to clustering, a concise survey of existing (clustering) algorithms as well as providing a comparison, both from a theoretical and an empirical perspective. From a theoretical perspective, we developed a categorizing framework based on the main properties pointed out in previous studies. Empirically, we conducted extensive experiments where we compared the most representative algorithm from each of the categories using a large number of real (big) data sets. The effectiveness of the candidate clustering algorithms is measured through a number of internal and external validity metrics, stability, runtime, and scalability tests. In addition, we highlighted the set of clustering algorithms that are the best performing for big data.

833 citations

Journal ArticleDOI
TL;DR: This survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing.
Abstract: Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a transformative approach for providing numerous services. Compact smart devices constitute an essential part of IoT. They range widely in use, size, energy capacity, and computation power. However, the integration of these smart things into the standard Internet introduces several security challenges because the majority of Internet technologies and communication protocols were not designed to support IoT. Moreover, commercialization of IoT has led to public security concerns, including personal privacy issues, threat of cyber attacks, and organized crime. In order to provide a guideline for those who want to investigate IoT security and contribute to its improvement, this survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing. To achieve this goal, we first briefly describe three widely-known IoT reference models and define security in the context of IoT. Second, we discuss the possible applications of IoT and potential motivations of the attackers who target this new paradigm. Third, we discuss different attacks and threats. Fourth, we describe possible countermeasures against these attacks. Finally, we introduce two emerging security challenges not yet explained in detail in previous literature.

547 citations

Journal ArticleDOI
TL;DR: This paper surveys over one hundred IoT smart solutions in the marketplace and examines them closely in order to identify the technologies used, functionalities, and applications, and suggests a number of potentially significant research directions.
Abstract: The Internet of Things (IoT) is a dynamic global information network consisting of Internet-connected objects, such as Radio frequency identifications, sensors, actuators, as well as other instruments and smart appliances that are becoming an integral component of the future Internet. Over the last decade, we have seen a large number of the IoT solutions developed by start-ups, small and medium enterprises, large corporations, academic research institutes (such as universities), and private and public research organizations making their way into the market. In this paper, we survey over one hundred IoT smart solutions in the marketplace and examine them closely in order to identify the technologies used, functionalities, and applications. Based on the application domain, we classify and discuss these solutions under five different categories: 1) smart wearable; 2) smart home; 3) smart city; 4) smart environment; and 5) smart enterprise. This survey is intended to serve as a guideline and a conceptual framework for future research in the IoT and to motivate and inspire further developments. It also provides a systematic exploration of existing research and suggests a number of potentially significant research directions.

388 citations

Journal ArticleDOI
TL;DR: A novel model for intrusion detection based on two-layer dimension reduction and two-tier classification module, designed to detect malicious activities such as User to Root (U2R) and Remote to Local (R2L) attacks is presented.
Abstract: With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure. In this paper, we present a novel model for intrusion detection based on two-layer dimension reduction and two-tier classification module, designed to detect malicious activities such as User to Root (U2R) and Remote to Local (R2L) attacks. The proposed model is using component analysis and linear discriminate analysis of dimension reduction module to spate the high dimensional dataset to a lower one with lesser features. We then apply a two-tier classification module utilizing Naive Bayes and Certainty Factor version of K-Nearest Neighbor to identify suspicious behaviors. The experiment results using NSL-KDD dataset shows that our model outperforms previous models designed to detect U2R and R2L attacks.

356 citations

Journal ArticleDOI
TL;DR: Fog computation and MCPS are integrated to build fog computing supported MCPS (FC-MCPS), and an LP-based two-phase heuristic algorithm is proposed that produces near optimal solution and significantly outperforms a greedy algorithm.
Abstract: With the recent development in information and communication technology, more and more smart devices penetrate into people’s daily life to promote the life quality. As a growing healthcare trend, medical cyber-physical systems (MCPSs) enable seamless and intelligent interaction between the computational elements and the medical devices. To support MCPSs, cloud resources are usually explored to process the sensing data from medical devices. However, the high quality-of-service of MCPS challenges the unstable and long-delay links between cloud data center and medical devices. To combat this issue, mobile edge cloud computing, or fog computing, which pushes the computation resources onto the network edge (e.g., cellular base stations), emerges as a promising solution. We are thus motivated to integrate fog computation and MCPS to build fog computing supported MCPS (FC-MCPS). In particular, we jointly investigate base station association, task distribution, and virtual machine placement toward cost-efficient FC-MCPS. We first formulate the problem into a mixed-integer non-linear linear program and then linearize it into a mixed integer linear programming (LP). To address the computation complexity, we further propose an LP-based two-phase heuristic algorithm. Extensive experiment results validate the high-cost efficiency of our algorithm by the fact that it produces near optimal solution and significantly outperforms a greedy algorithm.

309 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
2023145
2022188
2021164
2020104
201969
201857