Security Issues in Fog Computing for Internet of Things
暂无分享,去创建一个
[1] Gary B. Wills,et al. Validation of an adaptive risk-based access control model for the Internet of Things , 2018 .
[2] Gary B. Wills,et al. An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things , 2017, IoTBDS.
[3] Pradeep Reddy,et al. A Hybrid Meta-Heuristic Approach for QoS-Aware Cloud Service Composition , 2018, Int. J. Web Serv. Res..
[4] Praveen Kumar Reddy,et al. Applications of Domain-Specific Predictive Analytics Applied to Big Data , 2019 .
[5] S.Bharath Bhushan,et al. A Four-level Linear Discriminant Analysis Based Service Selection in the Cloud Environment , 2016 .
[6] Tom H. Luan,et al. Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.
[7] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[8] S. Bharath Bhushan,et al. A Network QoS Aware Service Ranking Using Hybrid AHP-PROMETHEE Method in Multi-Cloud Domain , 2016 .
[9] Burak Kantarci,et al. Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[10] Wolfgang Kastner,et al. Extending the EPCIS with Building Automation Systems: A New Information System for the Internet of Things , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[11] Vaishali Ravindra Thakare,et al. Multi-Layer Token Based Authentication Through Honey Password in Fog Computing , 2018 .