Blockchain Expansion to secure Assets with Fog Node on special Duty
暂无分享,去创建一个
Anand Paul | Rabia Riaz | Abdul Rehman | Seungmin Rho | M. junaid Gul | Anand Paul | A. Rehman | R. Riaz | Jeong-Hong Kim | M. J. Gul | Seungmin Rho | J. Kim
[1] Reza Tadayoni,et al. Cyber Security Threats to IoT Applications and Service Domains , 2017, Wireless Personal Communications.
[2] Tao Xiaofeng,et al. SDN based next generation Mobile Network with Service Slicing and trials , 2014, China Communications.
[3] Prasad Calyam,et al. Dolus: Cyber Defense using Pretense against DDoS Attacks in Cloud Platforms , 2018, ICDCN.
[4] Manoj Singh Gaur,et al. DDoS attacks in cloud computing: Issues, taxonomy, and future directions , 2017, Comput. Commun..
[5] ChooKim-Kwang Raymond,et al. Distributed denial of service (DDoS) resilience in cloud , 2016 .
[6] Athanasios V. Vasilakos,et al. The role of big data analytics in Internet of Things , 2017, Comput. Networks.
[7] Sunghyun Choi,et al. 3GPP SA2 architecture and functions for 5G mobile communication system , 2017, ICT Express.
[8] Brij B. Gupta,et al. Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..
[9] Yiliang Han,et al. Secure data outsourcing scheme in cloud computing with attribute-based encryption , 2018, Int. J. High Perform. Comput. Netw..
[10] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[11] Christopher Krügel,et al. Demystifying DDoS as a Service , 2017, IEEE Communications Magazine.
[12] Faisal Saeed,et al. IoT-Based Intelligent Modeling of Smart Home Environment for Fire Prevention and Safety , 2018, J. Sens. Actuator Networks.
[13] Kim-Kwang Raymond Choo,et al. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..
[14] Ibrar Yaqoob,et al. Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.
[15] Dharma P. Agrawal,et al. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .
[16] Salim Hariri,et al. IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[17] P. Siano,et al. Iot-based smart cities: A survey , 2016, 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC).
[18] Harry Timmermans,et al. Understanding travellers’ preferences for different types of trip destination based on mobile internet usage data , 2018 .
[19] Ling Li,et al. Introduction: Advances in IoT research and applications , 2015, Inf. Syst. Frontiers.
[20] Georgios Kambourakis,et al. The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[21] Miltiadis D. Lytras,et al. Enabling Technologies and Business Infrastructures for Next Generation Social Media: Big Data, Cloud Computing, Internet of Things and Virtual Reality , 2015, J. Univers. Comput. Sci..
[22] In Lee,et al. The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .
[23] Mohammed Ouzzif,et al. A Novel Security Framework for Managing Android Permissions Using Blockchain Technology , 2018, Int. J. Cloud Appl. Comput..
[24] Alvaro A. Cárdenas,et al. Big Data Analytics for Security , 2013, IEEE Security & Privacy.
[25] Navrati Saxena,et al. Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.
[26] Dimitris Mourtzis,et al. Industrial Big Data as a Result of IoT Adoption in Manufacturing , 2016 .
[27] ImreSándor,et al. A survey of handover management in LTE-based multi-tier femtocell networks , 2015 .
[28] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[29] ContiMauro,et al. DDoS attacks in cloud computing , 2016 .
[30] Sándor Imre,et al. A survey of handover management in LTE-based multi-tier femtocell networks: Requirements, challenges and solutions , 2015, Comput. Networks.
[31] Oladayo Olufemi Olakanmi,et al. An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms , 2019, Int. J. Cloud Appl. Comput..