Survey on Multi-Access Edge Computing Security and Privacy
暂无分享,去创建一个
Anca Delia Jurcut | Madhusanka Liyanage | Pasika Ranaweera | Pasika Sashmal Ranaweera | Madhusanka Liyanage | A. Jurcut
[1] Donald F. Towsley,et al. Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.
[2] Ahmed Meddahi,et al. SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[3] Yuan Tian,et al. Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).
[4] Xinyu Yang,et al. A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.
[5] Hong Wen,et al. Impact of Mobility on Physical Layer Security Over Wireless Fading Channels , 2018, IEEE Transactions on Wireless Communications.
[6] Ilsun You,et al. Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.
[7] Zdenek Becvar,et al. Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.
[8] Laxmana Rao Battula. Network Security Function Virtualization(NSFV) towards Cloud computing with NFV Over Openflow infrastructure: Challenges and novel approaches , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[9] Kim-Kwang Raymond Choo,et al. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.
[10] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[11] Salil S. Kanhere,et al. Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain , 2020, J. Netw. Comput. Appl..
[12] Chunhua Su,et al. A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices , 2018, IEEE Access.
[13] Rui Guo,et al. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.
[14] Victor Chang,et al. Security modeling and efficient computation offloading for service workflow in mobile edge computing , 2019, Future Gener. Comput. Syst..
[15] Pawani Porambage,et al. Performance Analysis of Local 5G Operator Architectures for Industrial Internet , 2020, IEEE Internet of Things Journal.
[16] Vijay Laxmi,et al. ETGuard: Detecting D2D Attacks using Wireless Evil Twins , 2019, Comput. Secur..
[17] Derek Abbott,et al. Emerging Physical Unclonable Functions With Nanotechnology , 2016, IEEE Access.
[18] Wenbing Zhao,et al. SPE: Security and Privacy Enhancement Framework for Mobile Devices , 2017, IEEE Transactions on Dependable and Secure Computing.
[19] Xianbin Wang,et al. A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication , 2018, IEEE Access.
[20] Eneko Atxutegi,et al. Exploitation of Mobile Edge Computing in 5G Distributed Mission-Critical Push-to-Talk Service Deployment , 2018, IEEE Access.
[21] A. Adam Ding,et al. SCADET: A Side-Channel Attack Detection Tool for Tracking Prime-Probe , 2018, 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[22] Anca Delia Jurcut,et al. Realizing Multi-Access Edge Computing Feasibility: Security Perspective , 2019, 2019 IEEE Conference on Standards for Communications and Networking (CSCN).
[23] Ping Zhang,et al. Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT , 2019, IEEE Internet of Things Journal.
[24] Xiaoming Fu,et al. A Survey on Virtual Machine Migration: Challenges, Techniques, and Open Issues , 2018, IEEE Communications Surveys & Tutorials.
[25] Sridhar Radhakrishnan,et al. Towards SDN-based fog computing: MQTT broker virtualization for effective and reliable delivery , 2016, 2016 8th International Conference on Communication Systems and Networks (COMSNETS).
[26] Long Chen,et al. A Defense Method against Docker Escape Attack , 2017, ICCSP '17.
[27] Hongke Zhang,et al. Smart Collaborative Caching for Information-Centric IoT in Fog Computing , 2017, Sensors.
[28] Wolfgang Kellerer,et al. An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement , 2017, IEEE Communications Magazine.
[29] Guy Pujolle,et al. Cloudlet- and NFV-based carrier Wi-Fi architecture for a wider range of services , 2016, Ann. des Télécommunications.
[30] Robail Yasrab,et al. Mitigating Docker Security Issues , 2018, ArXiv.
[31] Marja Matinmikko-Blue,et al. Micro-Operator driven Local 5G Network Architecture for Industrial Internet , 2018, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[32] Vishal Sharma,et al. Security of 5G-Mobile Backhaul Networks: A Survey , 2018, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[33] Shunliang Zhang,et al. An Overview of Network Slicing for 5G , 2019, IEEE Wireless Communications.
[34] Andrei V. Gurtov,et al. Improving the tunnel management performance of secure VPLS architectures with SDN , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[35] Rose Qingyang Hu,et al. Security for 5G Mobile Wireless Networks , 2018, IEEE Access.
[36] Ashraf Matrawy,et al. Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).
[37] Roch H. Glitho,et al. A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.
[38] Lei Shu,et al. Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges , 2018, IEEE Communications Surveys & Tutorials.
[39] Masahiro Yoshida,et al. Multi-access Edge Computing: A Survey , 2018, J. Inf. Process..
[40] Rajiv Ranjan,et al. Osmotic Computing: A New Paradigm for Edge/Cloud Integration , 2016, IEEE Cloud Computing.
[41] Ruhul Amin,et al. Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..
[42] Hai Jiang,et al. Managing Physical Layer Security in Wireless Cellular Networks: A Cyber Insurance Approach , 2018, IEEE Journal on Selected Areas in Communications.
[43] Ann Cavoukian,et al. Privacy by Design [Leading Edge] , 2012, IEEE Technol. Soc. Mag..
[44] Xiaoyan Wang,et al. Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things , 2018, IEEE Communications Magazine.
[45] Jin Cao,et al. Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks , 2019, IEEE Access.
[46] Jason P. Jue,et al. All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .
[47] Dusit Niyato,et al. Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.
[48] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[49] Xiaodong Lin,et al. Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.
[50] D. JaidharC.,et al. Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor , 2017, Digit. Investig..
[51] Sunghyun Choi,et al. 3GPP SA2 architecture and functions for 5G mobile communication system , 2017, ICT Express.
[52] Madhusanka Liyanage,et al. Novel MEC Based Approaches for Smart Hospitals to Combat COVID-19 Pandemic , 2020, IEEE Consumer Electronics Magazine.
[53] Jin Cao,et al. Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[54] Stuart S. Shapiro,et al. Privacy by design , 2010, Commun. ACM.
[55] Nezer Zaidenberg,et al. Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot , 2019, ICISSP.
[56] Andrei V. Gurtov,et al. Software defined VPLS architectures: Opportunities and challenges , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[57] Lilian Bossuet,et al. Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[58] Ioannis Sfyrakis,et al. A Survey on Hardware Approaches for Remote Attestation in Network Infrastructures , 2020, ArXiv.
[59] David Hutchison,et al. Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends , 2017, IEEE Communications Surveys & Tutorials.
[60] Huaglory Tianfield,et al. Virtual Machine Introspection , 2014, SIN.
[61] Eddie Li,et al. An Overview of Cloud Based Content Delivery Networks: Research Dimensions and State-of-the-Art , 2015, Trans. Large Scale Data Knowl. Centered Syst..
[62] Tarik Taleb,et al. Virtual security as a service for 5G verticals , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[63] Rabih Bashroush,et al. Towards a More Representative Definition of Cyber Security , 2017, J. Digit. Forensics Secur. Law.
[64] M. Shamim Hossain,et al. Towards a Secure Mobile Edge Computing Framework for Hajj , 2017, IEEE Access.
[65] Bernd Jäger,et al. Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[66] Seungjoon Lee,et al. Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.
[67] Deven Shah,et al. Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment , 2018 .
[68] David Hausheer,et al. A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts , 2017, AIMS.
[69] Dijiang Huang,et al. Mobile Cloud Computing: Foundations and Service Models , 2017 .
[70] Martin Knahl,et al. Software Defined Privacy , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).
[71] Thar Baker,et al. AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes , 2020, Journal of Ambient Intelligence and Humanized Computing.
[72] Mika Ylianttila,et al. Survey on blockchain based smart contracts: Applications, opportunities and challenges , 2021, J. Netw. Comput. Appl..
[73] Yong Zhao,et al. Communication-Constrained Mobile Edge Computing Systems for Wireless Virtual Reality: Scheduling and Tradeoff , 2018, IEEE Access.
[74] Rajkumar Buyya,et al. Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.
[75] Zhiyuan Hu,et al. A framework for security on demand , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[76] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[77] Nhien-An Le-Khac,et al. Security Considerations for Internet of Things: A Survey , 2020, SN Computer Science.
[78] Pawani Porambage,et al. Securing Gadget-Free Digital Services , 2018, Computer.
[79] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[80] Ubaidullah Alias Kashif,et al. Architectural Design of Trusted Platform for IaaS Cloud Computing , 2018, Int. J. Cloud Appl. Comput..
[81] Mounir Hamdi,et al. A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things , 2020, IEEE Internet of Things Journal.
[82] Yonggang Fang,et al. MEC in an Enterprise Setting : A Solution Outline , 2018 .
[83] Mahabub Hasan Mahalat,et al. A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices , 2018, 2018 8th International Symposium on Embedded Computing and System Design (ISED).
[84] Yong-Sung Jeon,et al. Design of an LPWAN communication module based on secure element for smart parking application , 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE).
[85] Richeng Jin,et al. Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT , 2019, IEEE Internet of Things Journal.
[86] June-Koo Kevin Rhee,et al. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system , 2016, Quantum Inf. Process..
[87] Jiabin Wang,et al. A Survey on Mobile Edge Computing: Focusing on Service Adoption and Provision , 2018, Wirel. Commun. Mob. Comput..
[88] Guy Gogniat,et al. Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm , 2018, 2018 Global Information Infrastructure and Networking Symposium (GIIS).
[89] Ahmed Meddahi,et al. A First Step Towards Security Extension for NFV Orchestrator , 2017, SDN-NFV@CODASPY.
[90] Yong-Yuan Deng,et al. A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing , 2020, Wirel. Pers. Commun..
[91] Jie Xu,et al. Exploiting Physical-Layer Security for Multiuser Multicarrier Computation Offloading , 2018, IEEE Wireless Communications Letters.
[92] Zheng Yan,et al. Adaptive security-related data collection with context awareness , 2019, J. Netw. Comput. Appl..
[93] Tarik Taleb,et al. Traffic Steering for Service Function Chaining , 2019, IEEE Communications Surveys & Tutorials.
[94] Timothy W. Finin,et al. Preserving User Privacy and Security in Context-Aware Mobile Platforms , 2016 .
[95] Emre Gündüzhan,et al. Narrowband Satellite Communications : Challenges and Emerging Solutions , 2015 .
[96] Jong-Hyouk Lee. Secure authentication with dynamic tunneling in distributed IP mobility management , 2016, IEEE Wireless Communications.
[97] Dario Sabella,et al. Mobile-Edge Computing Architecture: The role of MEC in the Internet of Things , 2016, IEEE Consumer Electronics Magazine.
[98] Yong Ren,et al. Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems , 2019, IEEE Transactions on Vehicular Technology.
[99] Zhiwei Zhao,et al. Towards Fast and Reliable WiFi Authentication by Utilizing Visible Light Diversity , 2019, 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[100] Thanh Bui,et al. Analysis of Docker Security , 2015, ArXiv.
[101] Westley Weimer,et al. Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage , 2017, RAID.
[102] Yin Chen,et al. On-Device Mobile Phone Security Exploits Machine Learning , 2017, IEEE Pervasive Computing.
[103] Hai Jin,et al. CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection , 2017, IEEE Access.
[104] Andrei Gurtov,et al. Leveraging LTE security with SDN and NFV , 2015, 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS).
[105] Cataldo Basile,et al. A novel approach for integrating security policy enforcement with dynamic network virtualization , 2015, Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft).
[106] An Braeken,et al. Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks , 2019, IEEE Access.
[107] Ning Zhang,et al. A Survey on Service Migration in Mobile Edge Computing , 2018, IEEE Access.
[108] Gang Feng,et al. On Robustness of Network Slicing for Next-Generation Mobile Networks , 2019, IEEE Transactions on Communications.
[109] Andres Garcia-Saavedra,et al. 5G-Crosshaul: An SDN/NFV Integrated Fronthaul/Backhaul Transport Network Architecture , 2017, IEEE Wireless Communications.
[110] Kin K. Leung,et al. Live Service Migration in Mobile Edge Clouds , 2017, IEEE Wireless Communications.
[111] Mugen Peng,et al. Network Slicing in Fog Radio Access Networks: Issues and Challenges , 2017, IEEE Communications Magazine.
[112] Mubashir Husain Rehmani,et al. Mobile Edge Computing: Opportunities, solutions, and challenges , 2017, Future Gener. Comput. Syst..
[113] Andreas Kunz,et al. Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[114] Mimoza Durresi,et al. Mobile Privacy Protection Enhanced with Multi-access Edge Computing , 2018, 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).
[115] Talal Alharbi,et al. Virtualized Network Functions security attacks and vulnerabilities , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[116] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[117] Mugen Peng,et al. Edge computing technologies for Internet of Things: a primer , 2017, Digit. Commun. Networks.
[118] Madhusanka Liyanage,et al. Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).
[119] Taufik Abrao,et al. A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks , 2017, IEEE Access.
[120] Yuqiong Sun,et al. Security-as-a-Service for Microservices-Based Cloud Applications , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[121] Lei Zhao,et al. Optimal Placement of Cloudlets for Access Delay Minimization in SDN-Based Internet of Things Networks , 2018, IEEE Internet of Things Journal.
[122] L. Javier García-Villalba,et al. Adaptive artificial immune networks for mitigating DoS flooding attacks , 2018, Swarm Evol. Comput..
[123] Cong Shen,et al. Designing Security-Aware Incentives for Computation Offloading via Device-to-Device Communication , 2016, IEEE Transactions on Wireless Communications.
[124] Ioannis G. Askoxylakis,et al. A Reactive Security Framework for operational wind parks using Service Function Chaining , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).
[125] Pasquale Pace,et al. Securing the IoT world: Issues and perspectives , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[126] Patrick Bours,et al. Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones , 2018, ICBEA '18.
[127] Anca Delia Jurcut,et al. Introduction to IoT Security , 2020 .
[128] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[129] Dushantha Nalin K. Jayakody,et al. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.
[130] Andrei V. Gurtov,et al. Fast Transmission Mechanism for Secure VPLS Architectures , 2017, 2017 IEEE International Conference on Computer and Information Technology (CIT).
[131] Tarik Taleb,et al. Survey on Multi-Access Edge Computing for Internet of Things Realization , 2018, IEEE Communications Surveys & Tutorials.
[132] Gavin Brown,et al. Deep learning-based classification and anomaly detection of side-channel signals , 2018, Defense + Security.
[133] Ting He,et al. Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach , 2017, IEEE Journal on Selected Areas in Communications.
[134] Antonio F. Gómez-Skarmeta,et al. Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[135] Weizhe Zhang,et al. Resource allocation and computation offloading with data security for mobile edge computing , 2019, Future Gener. Comput. Syst..
[136] Tarik Taleb,et al. On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration , 2017, IEEE Communications Surveys & Tutorials.
[137] Yacine Challal,et al. Security in device-to-device communications: a survey , 2018, IET Networks.
[138] Dario Pompili,et al. Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.
[139] Ruby B. Lee,et al. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds , 2016, RAID.
[140] Manuel Díaz,et al. On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[141] Pawani Porambage,et al. Convergence of ICN and MEC for 5G: Opportunities and Challenges , 2020, IEEE Communications Standards Magazine.
[142] Ching-Hsien Hsu,et al. Edge server placement in mobile edge computing , 2019, J. Parallel Distributed Comput..
[143] Keke Gai,et al. Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.
[144] Tarik Taleb,et al. NFV: Security Threats and Best Practices , 2017, IEEE Communications Magazine.
[145] Xianbin Wang,et al. Integrating PHY Security Into NDN-IoT Networks By Exploiting MEC: Authentication Efficiency, Robustness, and Accuracy Enhancement , 2019, IEEE Transactions on Signal and Information Processing over Networks.
[146] An Braeken,et al. BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks , 2020, IEEE Access.
[147] Wei Li,et al. On the Secrecy Capacity of 5G MmWave Small Cell Networks , 2018, IEEE Wireless Communications.
[148] Jeff Reeve,et al. The Security Trade-Offs in Resource Constrained Nodes for IoT Application , 2018 .
[149] Atay Ozgovde,et al. Enabling service-centric networks for cloudlets using SDN , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[150] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[151] Jose Ordonez-Lucena,et al. Network Slicing for 5G with SDN/NFV: Concepts, Architectures, and Challenges , 2017, IEEE Communications Magazine.
[152] David Hutchison,et al. The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective , 2017, IEEE Journal on Selected Areas in Communications.
[153] Degang Sun,et al. SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing , 2016, SCC@AsiaCCS.
[154] Zheng Qin,et al. T2FA: Transparent Two-Factor Authentication , 2018, IEEE Access.
[155] Huaiyu Dai,et al. A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions , 2017, IEEE Communications Surveys & Tutorials.
[156] Wei Cao,et al. Intelligent Offloading in Multi-Access Edge Computing: A State-of-the-Art Review and Framework , 2019, IEEE Communications Magazine.
[157] Changcheng Huang,et al. Availability-Aware Mobile Edge Application Placement in 5G Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[158] Narendra S. Chaudhari,et al. Security Vulnerabilities in Handover Authentication Mechanism of 5G Network , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).
[159] Kim-Kwang Raymond Choo,et al. A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing , 2020, IEEE Systems Journal.
[160] Andrei V. Gurtov,et al. Opportunities and Challenges of Software-Defined Mobile Networks in Network Security , 2016, IEEE Security & Privacy.
[161] Richeng Jin,et al. Privacy-Aware Offloading in Mobile-Edge Computing , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[162] Athanasios V. Vasilakos,et al. A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.
[163] Xiong Li,et al. Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications , 2019, IEEE Internet of Things Journal.
[164] Tarik Taleb,et al. Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[165] Rafal Wojtczuk. Poacher turned gamekeeper: Lessons learned from eight years of breaking hypervisors , 2014 .
[166] Hsiao-Hwa Chen,et al. Machine-to-Machine Communications in Ultra-Dense Networks—A Survey , 2017, IEEE Communications Surveys & Tutorials.
[167] Zhaowen Lin,et al. Dynamic Virtualization Security Service Construction Strategy for Software Defined Networks , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).
[168] Tanesh Kumar,et al. 5G Privacy: Scenarios and Solutions , 2018, 2018 IEEE 5G World Forum (5GWF).
[169] Pawani Porambage,et al. Five Driving Forces of Multi-Access Edge Computing , 2018, ArXiv.
[170] Madhusanka Liyanage,et al. Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).
[171] Frank van Lingen,et al. The Unavoidable Convergence of NFV, 5G, and Fog: A Model-Driven Approach to Bridge Cloud and Edge , 2017, IEEE Communications Magazine.
[172] Xing Zhang,et al. A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications , 2017, IEEE Access.
[173] Ada Gavrilovska,et al. Towards IoT-DDoS Prevention Using Edge Computing , 2018, HotEdge.
[174] Himanshu Gupta,et al. Impact of Side Channel Attack in Information Security , 2019, 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE).
[175] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[176] Asit Chakraborti,et al. 5G-ICN: Delivering ICN Services over 5G Using Network Slicing , 2016, IEEE Communications Magazine.
[177] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[178] Wei Quan,et al. Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing , 2017, Mob. Inf. Syst..