Placement optimization of IoT security solutions for edge computing based on graph theory
暂无分享,去创建一个
Jean-Marie Le Bars | Morgan Barbier | Jean-Luc Grimault | Chrystel Gaber | Tanguy Godquin | Chrystel Gaber | Jean-Luc Grimault | J. L. Bars | Morgan Barbier | Tanguy Godquin
[1] P. Bonacich. Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.
[2] Matthias Dehmer,et al. Quantitative graph theory : mathematical foundations and applications , 2014 .
[3] Thierry Coupaye,et al. Combining hardware nodes and software components ordering-based heuristics for optimizing the placement of distributed IoT applications in the fog , 2018, SAC.
[4] Guy Pujolle,et al. QoS-Aware VNF Placement Optimization in Edge-Central Carrier Cloud Architecture , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[5] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[6] Tal Mizrahi,et al. Proof of Transit , 2019 .
[7] Gert Sabidussi,et al. The centrality index of a graph , 1966 .
[8] Aiman Erbad,et al. Edge computing for interactive media and video streaming , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).
[9] Britta Ruhnau,et al. Eigenvector-centrality - a node-centrality? , 2000, Soc. Networks.
[10] Md Mehedi Hassan Onik,et al. A Novel Approach for Network Attack Classification Based on Sequential Questions , 2018, ArXiv.
[11] Philipp Leitner,et al. Optimized IoT service placement in the fog , 2017, Service Oriented Computing and Applications.
[12] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[13] P. Banerjee,et al. Optimality criterion for the insertion of multi-interface nodes to improve connectivity in heterogeneous IoT framework , 2017, 2017 Devices for Integrated Circuit (DevIC).
[14] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[15] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[16] Beibei Li,et al. Mobile Targeting Using Customer Trajectory Patterns , 2019, Manag. Sci..
[17] Cristina Alcaraz,et al. A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.
[18] Pascal Urien,et al. Internet of Things: A Definition & Taxonomy , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[19] Arnaud Legrand,et al. Fog Based Framework for IoT Service Provisioning , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).