相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Secure Deduplication-Based Storage Systems With Resistance to Side-Channel Attacks via Fog Computing
Youshui Lu et al.
IEEE SENSORS JOURNAL (2022)
Complying With Data Handling Requirements in Cloud Storage Systems
Martin Henze et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)
A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things
Abdulmalik Alwarafy et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
Abdullah Al-Noman Patwary et al.
ELECTRONICS (2021)
Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
Farouq Aliyu et al.
CMC-COMPUTERS MATERIALS & CONTINUA (2021)
Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number
Jianan Hong et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Fog-SDN: A light mitigation scheme for DDoS attack in fog computing framework
Rojalina Priyadarshini et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)
A Reliable Trust Computing Mechanism Based on Multisource Feedback and Fog Computing in Social Sensor Cloud
Junbin Liang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
An Architecture for QoS-Aware Fog Service Provisioning
Elarbi Badidi et al.
11TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 3RD INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS (2020)
Security Issues in Fog Environment: A Systematic Literature Review
Jasleen Kaur et al.
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS (2020)
Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning
Ahmed Samy et al.
IEEE ACCESS (2020)
A survey of edge computing-based designs for IoT security
Kewei Sha et al.
DIGITAL COMMUNICATIONS AND NETWORKS (2020)
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks
Jie Cui et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)
Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
Yongjun Ren et al.
APPLIED SCIENCES-BASEL (2019)
Privacy Techniques for Edge Computing Systems
Fang-Yu Rao et al.
PROCEEDINGS OF THE IEEE (2019)
Edge Computing Security: State of the Art and Challenges
Yinhao Xiao et al.
PROCEEDINGS OF THE IEEE (2019)
A Survey of Virtual Machine Management in Edge Computing
Zeyi Tao et al.
PROCEEDINGS OF THE IEEE (2019)
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
Belal Sudqi Khater et al.
APPLIED SCIENCES-BASEL (2019)
A Mechanism for Securing IoT-enabled Applications at the Fog Layer
Nadeem Abbas et al.
JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2019)
Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges
Ruizhe Yang et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Security and Privacy Issues in Cloud, Fog and Edge Computing
Shalin Parikh et al.
10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS (2019)
Trust Management Techniques for the Internet of Things: A Survey
Ikram Ud Din et al.
IEEE ACCESS (2019)
Security and trust issues in Fog computing: A survey
PeiYun Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A scalable distributed machine learning approach for attack detection in edge computing environments
Rafal Kozik et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2018)
Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues
Jiale Zhang et al.
IEEE ACCESS (2018)
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion
Jie Yuan et al.
IEEE ACCESS (2018)
Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions
Ranesh Kumar Naha et al.
IEEE ACCESS (2018)
A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing
Farouq Aliyu et al.
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018) (2018)
Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack
Shanshan Tu et al.
IEEE ACCESS (2018)
A Survey on Mobile Edge Computing: The Communication Perspective
Yuyi Mao et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Fog Computing for the Internet of Things: Security and Privacy Issues
Arwa Alrawais et al.
IEEE INTERNET COMPUTING (2017)
Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things
Qinlong Huang et al.
IEEE ACCESS (2017)
Wearable IoT sensor based healthcare system for identifying and controlling chikungunya virus
Sandeep K. Sood et al.
COMPUTERS IN INDUSTRY (2017)
Fog computing security: a review of current applications and security solutions
Saad Khan et al.
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2017)
A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems
Tiago Cruz et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2016)
Fog and IoT: An Overview of Research Opportunities
Mung Chiang et al.
IEEE INTERNET OF THINGS JOURNAL (2016)
Cloud computing and education: A state-of-the-art survey
Jose A. Gonzalez-Martinez et al.
COMPUTERS & EDUCATION (2015)
A Survey of Security Issues in Hardware Virtualization
Gabor Pek et al.
ACM COMPUTING SURVEYS (2013)
A survey of intrusion detection techniques in Cloud
Chirag Modi et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)