Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing
暂无分享,去创建一个
[1] Rajkumar Buyya,et al. Network-centric performance analysis of runtime application migration in mobile cloud computing , 2015, Simul. Model. Pract. Theory.
[2] Dario Pompili,et al. Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.
[3] Xiaoyong Li,et al. A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion , 2018, IEEE Access.
[4] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[5] Giancarlo Fortino,et al. An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0 , 2019, IEEE Transactions on Industrial Informatics.
[6] Ahmad Ridha,et al. Feedback behavior and its role in trust assessment for peer-to-peer systems , 2010, Telecommun. Syst..
[7] Jean Peccoud,et al. Cyberbiosecurity: From Naive Trust to Risk Awareness. , 2018, Trends in biotechnology.
[8] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[9] Zdenek Becvar,et al. Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.
[10] Wenbin Yao,et al. Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service , 2018, IEEE Transactions on Information Forensics and Security.
[11] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[12] Brij B. Gupta,et al. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..
[13] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[14] Xiaoming Fu,et al. Reducing the network overhead of user mobility–induced virtual machine migration in mobile edge computing , 2018, Softw. Pract. Exp..
[15] Feng Zhou,et al. Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds , 2015, IEEE Transactions on Parallel and Distributed Systems.
[16] Martin Maier,et al. Mobile Edge Computing Empowered Fiber-Wireless Access Networks in the 5G Era , 2017, IEEE Communications Magazine.
[17] Gang Qu,et al. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy , 2019, IEEE Transactions on Intelligent Transportation Systems.
[18] Xiaoyong Li,et al. Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things , 2018, IEEE Access.
[19] F. Richard Yu,et al. Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications , 2018, IEEE Wireless Communications.
[20] Stefano Chessa,et al. A Social-Driven Edge Computing Architecture for Mobile Crowd Sensing Management , 2019, IEEE Communications Magazine.
[21] Jing Zhang,et al. An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks , 2019, IEEE Transactions on Intelligent Transportation Systems.
[22] Jordi Pérez-Romero,et al. Introducing Mobile Edge Computing Capabilities through Distributed 5G Cloud Enabled Small Cells , 2016, Mob. Networks Appl..
[23] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[24] Wei Ni,et al. Stochastic Online Learning for Mobile Edge Computing: Learning from Changes , 2019, IEEE Communications Magazine.
[25] Michal Choras,et al. A scalable distributed machine learning approach for attack detection in edge computing environments , 2018, J. Parallel Distributed Comput..
[26] Hong Liu,et al. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.
[27] Maria Rita Palattella,et al. Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.
[28] Feng Zhou,et al. A multi-dimensional trust evaluation model for large-scale P2P computing , 2011, J. Parallel Distributed Comput..
[29] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[30] Wazir Zada Khan,et al. Edge computing: A survey , 2019, Future Gener. Comput. Syst..
[31] Rong Yu,et al. Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks , 2017, IEEE Access.
[32] Mohsen Guizani,et al. Security in the Internet of Things Supported by Mobile Edge Computing , 2018, IEEE Communications Magazine.
[33] Xiao-Yong Li,et al. Research on Dynamic Trust Model for Large Scale Distributed Environment , 2007 .
[34] Robert H. Deng,et al. Three architectures for trusted data dissemination in edge computing , 2006, Data Knowl. Eng..
[35] Santosh Biswas,et al. MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing , 2018, J. Netw. Comput. Appl..
[36] Khaled Ben Letaief,et al. Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices , 2016, IEEE Journal on Selected Areas in Communications.
[37] Xing Zhang,et al. A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications , 2017, IEEE Access.
[38] Ivan Stojmenovic,et al. An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..
[39] Feng Zhou,et al. Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management , 2012, IEEE Transactions on Parallel and Distributed Systems.
[40] Ching-Hsien Hsu,et al. Edge server placement in mobile edge computing , 2019, J. Parallel Distributed Comput..
[41] Feng Zhou,et al. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services , 2015, IEEE Transactions on Information Forensics and Security.