Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

Security threats against communication and computing task classification for edge computing

Authors

[ 1 ] Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ 2 ] Instytut Radiokomunikacji, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ SzD ] doctoral school student | [ P ] employee

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication

2023

Chapter type

chapter in monograph / paper

Publication language

english

Keywords
EN
  • edge computing
  • classification
  • machine learning
  • cyberattacks
Abstract

EN This paper addresses machine learning-based task allocation in edge-computing networks with diverse end-user devices (IoT devices) and diverse edge-computing servers. The task allocation problem is solved by generated-requests classification that can be mapped to servers with enough computational power and proximity to devices that translates to service latency and reliability. Moreover, the impact of cyberattacks on the classification algorithm is also studied.

Pages (from - to)

5-1 - 5-8

DOI

10.14339/STO-MP-IST-200-05-PDF

URL

https://www.sto.nato.int/publications/STO%20Meeting%20Proceedings/STO-MP-IST-200/MP-IST-200-05.pdf

Book

International Conference on Military Communication and Information Systems 2023 (ICMIS)

Presented on

International Conference on Military Communication and Information Systems, ICMIS 2023, 16-17.05.2023, Skopje, Macedonia, the former Yugoslav Republic of

Open Access Mode

publisher's website

Open Access Text Version

final published version

Date of Open Access to the publication

at the time of publication

Ministry points / chapter

5

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.