Emerging sensor-cloud technology for pervasive services and applications
This is an Editorial article for the Special Issue on "Emerging Sensor-Cloud Technology for Pervasive Services and Applications" of the International Journal of Distributed Sensor Networks.
| Main Authors: | Hassan, Mohammad Mehedi, Pathan, Al-Sakib Khan, Huh, Eui-Nam, Abawajy, Jemal |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
SAGE Publications Inc.
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/36802/ http://irep.iium.edu.my/36802/1/610106.pdf http://irep.iium.edu.my/36802/4/36802_Emerging%20sensor-cloud_scopus.pdf |
Similar Items
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Network and traffic engineering in emerging distributed computing applications
by: Abawajy, Jemal H., et al.
Published: (2013)
by: Abawajy, Jemal H., et al.
Published: (2013)
Denial of service in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Enabling security for service discovery in pervasive computing environments
by: Sharifi, Mahdi
Published: (2009)
by: Sharifi, Mahdi
Published: (2009)
Security management in heterogeneous distributed sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Heterogeneous Distributed Sensor Networks (HDSN)
by: Pathan, Al-Sakib Khan
Published: (2007)
by: Pathan, Al-Sakib Khan
Published: (2007)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Pervasive IOT: auto calibration in light sensor using embedded activity recognition
by: Neow, Zhi Chin
Published: (2021)
by: Neow, Zhi Chin
Published: (2021)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Energy-efficient secure routing in heavily deployed wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Mobile and pervasive computing in construction: An introduction
by: Anumba, C., et al.
Published: (2012)
by: Anumba, C., et al.
Published: (2012)
Semantic web service adaptation model for a pervasive learning scenario
by: Lau, B-Y-S., et al.
Published: (2008)
by: Lau, B-Y-S., et al.
Published: (2008)
Critical applications in vehicular ad hoc/sensor networks
by: Kumar, Neeraj, et al.
Published: (2014)
by: Kumar, Neeraj, et al.
Published: (2014)
Secure Group Association Management in Heterogeneous Distributed Sensor Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Multi-dimensional networking and distributed computing services
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
by: Mall, Dieynaba, et al.
Published: (2015)
by: Mall, Dieynaba, et al.
Published: (2015)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks
by: Guerroumi, Mohamed, et al.
Published: (2013)
by: Guerroumi, Mohamed, et al.
Published: (2013)
Advances in multimedia sensor networks for health-care and related applications
by: Hossain, M. Shamim, et al.
Published: (2015)
by: Hossain, M. Shamim, et al.
Published: (2015)
On the medium access control protocols suitable for wireless sensor networks – a survey
by: Guerroumi, Mohamed, et al.
Published: (2014)
by: Guerroumi, Mohamed, et al.
Published: (2014)
The Design of Flexible Pervasive Electronic Health Record (PEHR)
by: Abd Ghani, M. K., et al.
Published: (2011)
by: Abd Ghani, M. K., et al.
Published: (2011)
Feasibility of PKC in resource-constrained wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Advances in cognitive radio sensor networks
by: Kim, Hyung Seok, et al.
Published: (2014)
by: Kim, Hyung Seok, et al.
Published: (2014)
Network management in distributed systems
by: Abawajy, Jemal H., et al.
Published: (2010)
by: Abawajy, Jemal H., et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Similar Items
-
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008) -
Network and traffic engineering in emerging distributed computing applications
by: Abawajy, Jemal H., et al.
Published: (2013) -
Denial of service in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan
Published: (2010) -
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013) -
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)