4.7 Review

SDN/NFV architectures for edge-cloud oriented IoT: A systematic review

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems

Ivan Farris et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Chemistry, Analytical

Enabling Virtual AAA Management in SDN-Based IoT Networks

Alejandro Molina Zarca et al.

SENSORS (2019)

Article Computer Science, Information Systems

An Energy Efficient Integration Model for Sensor Cloud Systems

Ngoc-Thanh Dinh et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

VNF Placement Optimization at the Edge and Cloud

Aris Leivadeas et al.

FUTURE INTERNET (2019)

Article Computer Science, Artificial Intelligence

Cloud based SDN and NFV architectures for IoT infrastructure

Mamdouh Alenezi et al.

EGYPTIAN INFORMATICS JOURNAL (2019)

Review Computer Science, Hardware & Architecture

IoT survey: An SDN and fog computing perspective

Ola Salman et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Hardware & Architecture

Towards full virtualization of SDN infrastructure

Junfeng Li et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Hardware & Architecture

Throughput optimization for admitting NFV-enabled requests in cloud networks

Zichuan Xu et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Information Systems

Survey on Multi-Access Edge Computing for Internet of Things Realization

Pawani Porambage et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Engineering, Electrical & Electronic

On Enabling 5G Automotive Systems Using Follow Me Edge-Cloud Concept

Abdelkader Aissioui et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Hardware & Architecture

5G Virtualized Multi-access Edge Computing Platform for IoT Applications

Han-Chuan Hsieh et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

An Introduction to Dew Computing: Definition, Concept and Implications

Partha Pratim Ray

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Future Edge Cloud and Edge Computing for Internet of Things Applications

Jianli Pan et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Review Computer Science, Hardware & Architecture

Multimedia big data computing and Internet of Things applications: A taxonomy and process model

Aparna Kumari et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

Mobile Edge Computing Potential in Making Cities Smarter

Tarik Taleb et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Engineering, Electrical & Electronic

A MULTI-TENANT CLOUD- BASED DC NANO GRID FOR SELF-SUSTAINED SMART BUILDINGS IN SMART CITIES

Neeraj Kumar et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Information Systems

SDN/NFV-Based Mobile Packet Core Network Architectures: A Survey

Van-Giang Nguyen et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Telecommunications

Towards SDN/NFV-enabled satellite networks

Georgios Gardikis et al.

TELECOMMUNICATION SYSTEMS (2017)

Article Computer Science, Information Systems

Advancing Software-Defined Networks: A Survey

Jacob Cox et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications

Shuo Wang et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

SD-NFV as an Energy Efficient Approach for M2M Networks Using Cloud-Based 6LoWPAN Testbed

Bilal R. Al-Kaseem et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Hardware & Architecture

Future mode of operations for 5G-The SELFNET approach enabled by SDN/NFV

Pedro Neves et al.

COMPUTER STANDARDS & INTERFACES (2017)

Article Computer Science, Hardware & Architecture

Botnets and Internet of Things Security

Elisa Bertino et al.

COMPUTER (2017)

Review Multidisciplinary Sciences

DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions

Narmeen Zakaria Bawany et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2017)

Article Telecommunications

SDN and Virtualization-Based LTE Mobile Network Architectures: A Comprehensive Survey

Van-Giang Nguyen et al.

WIRELESS PERSONAL COMMUNICATIONS (2016)

Article Computer Science, Information Systems

A Survey on SDN Programming Languages: Toward a Taxonomy

Celio Trois et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Information Systems

A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications

Carlos Colman-Meixner et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Information Systems

Network Function Virtualization: State-of-the-Art and Research Challenges

Rashid Mijumbi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Software Engineering

Virtual Edge-Based Smart Community Network Management

Kim-Khoa Nguyen et al.

IEEE INTERNET COMPUTING (2016)

Article Computer Science, Information Systems

Network Functions Virtualization: A Survey

Juliver de Jesus Gil Herrera et al.

IEEE Latin America Transactions (2016)

Article Computer Science, Information Systems

Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges

Anam Sajid et al.

IEEE ACCESS (2016)

Article Computer Science, Information Systems

SDN and Virtualization Solutions for the Internet of Things:A Survey

Nikos Bizanis et al.

IEEE ACCESS (2016)

Article Computer Science, Information Systems

Orchestrating Virtualized Network Functions

Md. Faizul Bari et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Article Computer Science, Information Systems

Orchestrating Virtualized Network Functions

Md. Faizul Bari et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Article Computer Science, Hardware & Architecture

Enabling security functions with SDN: A feasibility study

Changhoon Yoon et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Theory & Methods

Bayesian Coalition Game for Contention-Aware Reliable Data Forwarding in Vehicular Mobile Cloud

Neeraj Kumar et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)

Article Engineering, Electrical & Electronic

Virtualized Security at the Network Edge: A User-Centric Approach

Diego Montero et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

Bayesian Coalition Game for the Internet of Things: An Ambient Intelligence-Based Evaluation

Neeraj Kumar et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

Toward a Lightweight Authentication and Authorization Framework for Smart Objects

Jose L. Hernandez-Ramos et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2015)

Article Computer Science, Theory & Methods

A First Step Toward Network Security Virtualization: From Concept To Prototype

Seungwon Shin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Chemistry, Analytical

Towards a Low-Cost Remote Memory Attestation for the Smart Grid

Xinyu Yang et al.

SENSORS (2015)

Article Computer Science, Information Systems

Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis

Neeraj Kumar et al.

IEEE INTERNET OF THINGS JOURNAL (2015)

Article Computer Science, Information Systems

Trends on virtualisation with software defined networking and network function virtualisation

Lorena Isabel Barona Lopez et al.

IET NETWORKS (2015)

Review Computer Science, Information Systems

Securing the Internet of Things: A Standardization Perspective

Sye Loong Keoh et al.

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Computer Science, Information Systems

SIMPLE-fying Middlebox Policy Enforcement Using SDN

Zafar Ayyub Qazi et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2013)

Article Computer Science, Information Systems

Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service

Justine Sherry et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2012)

Article Computer Science, Information Systems

A Survey on Cyber Security for Smart Grid Communications

Ye Yan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)

Article Computer Science, Information Systems

Cyber Security and Privacy Issues in Smart Grids

Jing Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)

Article Computer Science, Information Systems

Understanding Cloud Computing Vulnerabilities

Bernd Grobauer et al.

IEEE SECURITY & PRIVACY (2011)

Article Automation & Control Systems

Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

M. H. R. Khouzani et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2011)

Article Computer Science, Hardware & Architecture

Capacity and interference aware link scheduling with channel assignment in wireless mesh networks

Neeraj Kumar et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Review Computer Science, Artificial Intelligence

The use of artificial intelligence based techniques for intrusion detection: a review

Gulshan Kumar et al.

ARTIFICIAL INTELLIGENCE REVIEW (2010)

Article Engineering, Electrical & Electronic

Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols

David R. Raymond et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2009)

Article Computer Science, Information Systems

Denial-of-service in wireless sencsor networks: Attacks and defenses

David R. Raymond et al.

IEEE PERVASIVE COMPUTING (2008)