A Secure IoT-Based Cloud Platform Selection Using Entropy Distance Approach and Fuzzy Set Theory
暂无分享,去创建一个
Mohammad Reza Khosravi | Manoj Diwakar | Achyut Shankar | Prabhishek Singh | Muskan Jindal | Alakananda Chakraborty | M. Diwakar | M. Khosravi | Prabhishek Singh | A. Shankar | Muskan Jindal | Alakananda Chakraborty
[1] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[2] Farookh Khadeer Hussain,et al. Parallel Cloud Service Selection and Ranking Based on QoS History , 2014, International Journal of Parallel Programming.
[3] Martin Pelikan,et al. An introduction and survey of estimation of distribution algorithms , 2011, Swarm Evol. Comput..
[4] Pankaj Ganguly. Selecting the right IoT cloud platform , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).
[5] Pradeep Yadav,et al. A Survey on IOT enabled cloud platforms , 2020, 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT).
[6] Laszlo Toka,et al. 5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps , 2020, Sensors.
[7] Xiang Li,et al. Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach , 2019, IEEE Access.
[8] Riqing Chen,et al. Evaluating IoT Platforms Using Integrated Probabilistic Linguistic MCDM Method , 2020, IEEE Internet of Things Journal.
[9] Ahmad Kamil Mahmood,et al. Trust -Based Service Selection in Public Cloud Computing Using Fuzzy Modified VIKOR Method , 2013 .
[10] Shiju Satyadevan,et al. Security, Trust and Implementation Limitations of Prominent IoT Platforms , 2014, FICTA.
[11] Valery V. Korotaev,et al. In.IoT—A New Middleware for Internet of Things , 2021, IEEE Internet of Things Journal.
[12] Twenty-One Key Factors to Choose an IoT Platform: Theoretical Framework and Its Applications , 2020, IEEE Internet of Things Journal.
[13] João Paulo Papa,et al. Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.
[14] Rakesh D. Raut,et al. To identify the determinants of the CloudIoT technologies adoption in the Indian MSMEs: structural equation modelling approach , 2019, Int. J. Bus. Inf. Syst..
[15] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[16] Smriti Bhatt,et al. Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases , 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC).
[17] Ahmad Almogren,et al. Security Challenges and Strategies for the IoT in Cloud Computing , 2020, 2020 11th International Conference on Information and Communication Systems (ICICS).
[18] Ahmed E. Youssef. An Integrated MCDM Approach for Cloud Service Selection Based on TOPSIS and BWM , 2020, IEEE Access.
[19] Salahaldeen Duraibi,et al. The Security Issues in IoT - Cloud: A Review , 2020, 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA).
[20] Nirvana Meratnia,et al. Comparing Apples and Oranges in IoT Context: A Deep Dive Into Methods for Comparing IoT Platforms , 2020, IEEE Internet of Things Journal.
[21] Mohammad Mehedi Hassan,et al. A Robust Deep-Learning-Enabled Trust-Boundary Protection for Adversarial Industrial IoT Environment , 2021, IEEE Internet of Things Journal.
[22] Xun Xu,et al. IoT-enabled cloud-based additive manufacturing platform to support rapid product development , 2018, Int. J. Prod. Res..