Author:
Desai Shivani,Vyas Tarjni,Jambekar Vishakha
Publisher
Springer International Publishing
Reference68 articles.
1. Sangita, D., Ankita, C., & Reshamlal, P. (2015). A review on issues and challenges of cloud computing. International Journal of Innovations and Advancement in Computer Science, 4(1), 81–88.
2. Top Threats Working Group. (2016). The treacherous 12: cloud computing top threats in 2016. Seattle: Cloud Security Alliance.
3. Mishra, A. K., Tripathy, A. K., Puthal, D., & Yang, L. T. (2018). Analytical model for Sybil attack phases in internet of things. IEEE Internet of Things Journal, 6(1), 379–387.
4. Fadele, A. A., Othman, M., Hashem, I. A. T., Yaqoob, I., Imran, M., & Shoaib, M. (2019). A novel countermeasure technique for reactive jamming attack in internet of things. Multimedia Tools and Applications, 78(21), 29899–29920.
5. Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2018). Fog computing for Healthcare 4.0 environment: Opportunities and challenges. Computers & Electrical Engineering, 72, 1–13.