Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm
暂无分享,去创建一个
[1] Cengiz Kahraman,et al. Fuzzy Multicriteria Decision-Making: A Literature Review , 2015, Int. J. Comput. Intell. Syst..
[2] Brajendra Panda,et al. Maintaining Data Integrity in Fog Computing Based Critical Infrastructure Systems , 2019, 2019 International Conference on Computational Science and Computational Intelligence (CSCI).
[3] Alka Agrawal,et al. Security Issues in Fog Environment: A Systematic Literature Review , 2020, International Journal of Wireless Information Networks.
[4] An Braeken,et al. Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model , 2019, Wireless Networks.
[5] Fuhong Lin,et al. Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system , 2018, EURASIP J. Wirel. Commun. Netw..
[6] Hannu Tenhunen,et al. An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .
[7] Joseph K. Liu,et al. A Survey on Access Control in Fog Computing , 2018, IEEE Communications Magazine.
[8] K. S. Ravichandran,et al. Solving cloud vendor selection problem using intuitionistic fuzzy decision framework , 2018, Neural Computing and Applications.
[9] Krassimir T. Atanassov,et al. Intuitionistic fuzzy sets , 1986 .
[10] Carla Merkle Westphall,et al. Mutual Authentication for IoT in the Context of Fog Computing , 2019, 2019 11th International Conference on Communication Systems & Networks (COMSNETS).
[11] K. Atanassov. Operators over interval valued intuitionistic fuzzy sets , 1994 .
[12] Sushil Kumar,et al. Analytic hierarchy process: An overview of applications , 2006, Eur. J. Oper. Res..
[13] S. Mercy Shalinie,et al. Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.
[14] Prosanta Gope,et al. LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm , 2019, Comput. Secur..
[15] K. Atanassov. More on intuitionistic fuzzy sets , 1989 .
[16] Tanupriya Choudhury,et al. Fog computing: Common security issues and proposed countermeasures , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).
[17] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[18] Dimitris Gritzalis,et al. Access Control Issues in Utilizing Fog Computing for Transport Infrastructure , 2015, CRITIS.
[19] V. S. Shankar Sriram,et al. IIVIFS-WASPAS: An integrated Multi-Criteria Decision-Making perspective for cloud service provider selection , 2020, Future Gener. Comput. Syst..
[20] Choong Seon Hong,et al. An Architecture of IoT Service Delegation and Resource Allocation Based on Collaboration between Fog and Cloud Computing , 2016, Mob. Inf. Syst..
[21] Mohamed Abdel-Basset,et al. A neutrosophic theory based security approach for fog and mobile-edge computing , 2019, Comput. Networks.
[22] Shuai Geng,et al. Decision framework of photovoltaic module selection under interval-valued intuitionistic fuzzy environment , 2015 .
[23] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[24] Hu-Chen Liu,et al. Improving quality function deployment analysis with the cloud MULTIMOORA method , 2020, Int. Trans. Oper. Res..
[25] Rajkumar Buyya,et al. Cloud-Fog Interoperability in IoT-enabled Healthcare Solutions , 2018, ICDCN.
[26] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[27] T. Saaty. How to Make a Decision: The Analytic Hierarchy Process , 1990 .
[28] Ashok Kumar Das,et al. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.
[29] Tuva Selstad Dybedokken. Trust Management in Fog Computing , 2017 .
[30] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[31] N. Arunkumar,et al. Enabling technologies for fog computing in healthcare IoT systems , 2019, Future Gener. Comput. Syst..
[32] Costin Badica,et al. CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems: Authentication , 2019, 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT).
[33] Graham Morgan,et al. Fog Computing Security Challenges and Future Directions [Energy and Security] , 2019, IEEE Consumer Electronics Magazine.
[34] Jaesung Lim,et al. Design of Future UAV-Relay Tactical Data Link for Reliable UAV Control and Situational Awareness , 2018, IEEE Communications Magazine.
[35] Hossein Sayyadi Tooranloo,et al. Supplier selection and evaluation using interval-valued intuitionistic fuzzy AHP method , 2017 .
[36] Gwo-Hshiung Tzeng,et al. Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS , 2004, Eur. J. Oper. Res..
[37] Jong-Wuu Wu,et al. Correlation of intuitionistic fuzzy sets by centroid method , 2002, Inf. Sci..
[38] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[39] Prasant Kumar Pattnaik,et al. Cyber Security Metrics Evaluation Using Multi-criteria Decision-Making Approach , 2020 .
[40] Xuyun Zhang,et al. Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things , 2019, Secur. Commun. Networks.
[41] Qing-wei Cao,et al. Research on AHP with interval-valued intuitionistic fuzzy sets and its application in multi-criteria decision making problems , 2013 .
[42] Richa Verma,et al. A Systematic Survey on Fog steered IoT: Architecture, Prevalent Threats and Trust Models , 2020, International Journal of Wireless Information Networks.
[43] Chuah Chai Wen,et al. Fog Computing, Applications, Security and Challenges, Review , 2018, International Journal of Engineering & Technology.
[44] Tie Qiu,et al. Survey on fog computing: architecture, key technologies, applications and open issues , 2017, J. Netw. Comput. Appl..
[45] Francisco Chiclana,et al. Non-dominance and attitudinal prioritisation methods for intuitionistic and interval-valued intuitionistic fuzzy preference relations , 2012, Expert Syst. Appl..
[46] Thar Baker,et al. A Mechanism for Securing IoT-enabled Applications at the Fog Layer , 2019, J. Sens. Actuator Networks.
[47] Ludmil Mikhailov,et al. Deriving priorities from fuzzy pairwise comparison judgements , 2003, Fuzzy Sets Syst..
[48] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[49] Baoding Liu. Why is There a Need for Uncertainty Theory , 2012 .
[50] Richa Verma,et al. Security and Privacy Issues in Fog driven IoT Environment , 2019 .
[51] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..