Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog
暂无分享,去创建一个
[1] Shahriar Mirabbasi,et al. Wireless Energy Harvesting for Internet of Things , 2014 .
[2] Ali Dehghantanha,et al. Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[3] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[4] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[5] Murad Khan,et al. Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges , 2018 .
[6] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[7] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[8] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[9] Wonyong Yoon,et al. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects , 2015, Sensors.
[10] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[11] David Hutchison,et al. Review and Analysis of Networking Challenges in Cloud Computing , 2016, J. Netw. Comput. Appl..
[12] Sangtae Ha,et al. Clarifying Fog Computing and Networking: 10 Questions and Answers , 2017, IEEE Communications Magazine.
[13] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[14] Zdenek Becvar,et al. Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.
[15] Rinju Ravindran. IoT : A REVIEW ON SECURITY ISSUES AND MEASURES , 2015 .
[16] Weisong Shi,et al. The Promise of Edge Computing , 2016, Computer.
[17] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[18] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[19] Mung Chiang,et al. Fog for 5G and IoT , 2017 .
[20] Rajkumar Buyya,et al. Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..
[21] Mario Nemirovsky,et al. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[22] B. B. Gupta,et al. Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.
[23] Mohammed Atiquzzaman,et al. Interoperability in Internet of Things: Taxonomies and Open Challenges , 2018, Mobile Networks and Applications.
[24] W. Z. Khan,et al. Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model , 2016 .
[25] M'Hammed Sahnoun,et al. Challenges Facing the Industrial Implementation of Fog Computing , 2018, 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud).
[26] B. P. S. Sahoo,et al. Cloud Computing Features, Issues, and Challenges: A Big Picture , 2015, 2015 International Conference on Computational Intelligence and Networks.
[27] Schahram Dustdar,et al. Going Back to the Roots—The Evolution of Edge Computing, An IoT Perspective , 2018, IEEE Internet Computing.
[28] Zhou Cheng,et al. Overview of the Internet of Things , 2011 .
[29] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[30] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[31] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[32] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[33] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[34] Chris Rose,et al. The Security Implications Of The Internet Of Things , 2017 .
[35] Tie Qiu,et al. Survey on fog computing: architecture, key technologies, applications and open issues , 2017, J. Netw. Comput. Appl..
[36] Jonathan E. Fieldsend,et al. A Framework of Fog Computing: Architecture, Challenges, and Optimization , 2017, IEEE Access.
[37] Fang Liu,et al. NIST Cloud Computing Reference Architecture , 2011, 2011 IEEE World Congress on Services.
[38] Jing Wang,et al. Edge-Oriented Computing Paradigms , 2018, ACM Comput. Surv..
[39] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[40] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[41] Robert A. Dolin,et al. Deploying the "Internet of things" , 2006, International Symposium on Applications and the Internet (SAINT'06).
[42] Vittorio Scarano,et al. SEcS: scalable edge-computing services , 2005, SAC '05.
[43] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[44] Anant Sahai,et al. Design of a low-latency, high-reliability wireless communication system for control applications , 2014, 2014 IEEE International Conference on Communications (ICC).
[45] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[46] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[47] Tao Zhang,et al. Fog Computing , 2017, IEEE Internet Comput..
[48] Hardik Upadhyay,et al. An Approach to Secure Internet of Things Against DDoS , 2016 .
[49] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[50] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[51] Mumbai,et al. Internet of Things (IoT): A Literature Review , 2015 .
[52] Rajkumar Buyya,et al. Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.
[53] Soumya Kanti Datta,et al. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing , 2017, 2017 Global Internet of Things Summit (GIoTS).
[54] John K. Zao,et al. OpenFog security requirements and approaches , 2017, 2017 IEEE Fog World Congress (FWC).
[55] Roch H. Glitho,et al. A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.
[56] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[57] Yao Li,et al. Construction and Strategies in IoT Security System , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[58] Qun Li,et al. Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).
[59] Guochu Shou,et al. Mobile Edge Computing: Progress and Challenges , 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).