Collusion attacks mitigation in internet of things: a fog based model
暂无分享,去创建一个
[1] Mahmoud Al-Ayyoub,et al. The future of mobile cloud computing: Integrating cloudlets and Mobile Edge Computing , 2016, 2016 23rd International Conference on Telecommunications (ICT).
[2] Sangkyum Kim,et al. Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.
[3] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[4] Victor I. Chang,et al. A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication , 2017, Multimedia Tools and Applications.
[5] Meichun Hsu,et al. Clustering billions of data points using GPUs , 2009, UCHPC-MAW '09.
[6] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[7] Victor I. Chang,et al. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.
[8] Belle L. Tseng,et al. User reputation in a comment rating environment , 2011, KDD.
[9] Erman Ayday,et al. An iterative algorithm for trust and reputation management , 2009, 2009 IEEE International Symposium on Information Theory.
[10] Paul Van Dooren,et al. Iterative Filtering in Reputation Systems , 2010, SIAM J. Matrix Anal. Appl..
[11] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[12] Mahmoud Al-Ayyoub,et al. Collusion attacks in Internet of Things: Detection and mitigation using a fog based model , 2017, 2017 IEEE Sensors Applications Symposium (SAS).
[13] Elisa Bertino,et al. A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks , 2013, SenSys '13.
[14] Mahmoud Al-Ayyoub,et al. SDMEC: Software Defined System for Mobile Edge Computing , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).
[15] Tao Zhou,et al. A robust ranking algorithm to spamming , 2010, ArXiv.
[16] Yaser Jararweh,et al. A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[17] Yi-Cheng Zhang,et al. Information filtering via Iterative Refinement , 2006, ArXiv.
[18] Mahmoud Al-Ayyoub,et al. A new broadcast scheme for sensor networks , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).
[19] Victor I. Chang,et al. Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud , 2017, Multimedia Tools and Applications.
[20] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[21] Yaser Jararweh,et al. Internet of surveillance: a cloud supported large-scale wireless surveillance system , 2016, The Journal of Supercomputing.
[22] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.
[23] Hong Cheng,et al. Robust Reputation-Based Ranking on Bipartite Rating Networks , 2012, SDM.
[24] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[25] Yi-Cheng Zhang,et al. Decoding Information from noisy, redundant, and intentionally-distorted sources , 2006 .
[26] Victor I. Chang,et al. Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system , 2017, Future Gener. Comput. Syst..
[27] Victor I. Chang,et al. Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , 2018, Future Gener. Comput. Syst..