Author:
Sivasangari A.,Ajitha P.,Brumancia E.,Sujihelen L.,Rajesh G.
Publisher
Springer International Publishing
Reference38 articles.
1. Lu, R., Heung, K., Lashkari, A. H., Ghorbani, A. A. (2017). A Lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access Special Section On Security and Privacy In Applications and Services For Future Internet of Things, 5, 3302–3312.
2. Liu, X., Yang, Y., Choo, K.-K. R., & Wang, H. (2018). Security and privacy challenges for internet-of-things and fog computing. Hindawi Wireless Communications and Mobile Computing, 2018, 1–3.
3. Zhang, X., Yuan, Y., Zhou, Z., Li, S., Qi, L., & Puthal, D. (2019). Intrusion detection and prevention in cloud, fog, and internet of things. Hindawi Security and Communication Networks., 2019, 1–4.
4. Aliyua F., Sheltamia, T., Shakshukib, E. M. (2018). A detection and prevention technique for man in the middle attack in fog computing. The 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks EUSPN, pp. 24–31.
5. Lee, K., Kimy, D., Ha, D., Rajput, U., Oh, H. (2015). On security and privacy issues of fog computing supported internet of things environment. 6th International Conference on the Network of the Future (NOF), IEEE.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献