FOCUS: A fog computing-based security system for the Internet of Things
暂无分享,去创建一个
Zilong Ye | Salem Alharbi | Prashant Iyer | Peter Rodriguez | Rajaputhri Maharaja | Nivethitha Bose | Z. Ye | Salem Alharbi | P. Rodriguez | Rajaputhri Maharaja | Prashant Iyer | Nivethitha Bose
[1] Wuu Yang,et al. DDoS detection and traceback with decision tree and grey relational analysis , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[2] Nikolay Kakanakov,et al. Adaptive models for security and data protection in IoT with Cloud technologies , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[3] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[4] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[5] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[6] Prasad Calyam,et al. End-to-End IoT Security Middleware for Cloud-Fog Communication , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[7] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[8] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[9] Alex X. Liu,et al. Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[10] Nazar Abbas Saqib,et al. Internet of Things data analytics for user authentication and activity recognition , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).
[11] Riccardo Bonetto,et al. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[12] Yixian Yang,et al. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.
[13] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[14] Panita Pongpaibool,et al. Authorization mechanism for MQTT-based Internet of Things , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[15] Rodrigo Roman,et al. From SMOG to Fog: A security perspective , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).