Author:
Dao Nhu-Ngoc,Dinh Ngoc-Thanh,Pham Quoc-Viet,Phan Trung V.,Cho Sungrae,Braun Torsten
Publisher
Springer International Publishing
Reference35 articles.
1. Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., Gurtov, A.: Overview of 5G security challenges and solutions. IEEE Commun. Stand. Mag. 2(1), 36–43 (2018)
2. Al Hamid, H.A., Rahman, S.M.M., Hossain, M.S., Almogren, A., Alamri, A.: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5, 22313–22328 (2017)
3. Cisco Inc: Internet of things at a glance. https://www.cisco.com/c/dam/en/us/products/collateral/se/internet-of-things/at-a-glance-c45-731471.pdf (2020). Accessed 20 Feb 2020
4. Dao, N.N., Kim, J., Park, M., Cho, S.: Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks. PLOS ONE 11(8), e0160375 (2016)
5. Dao, N.N., Lee, Y., Cho, S., Kim, E., Chung, K.S., Keum, C.: Multi-tier multi-access edge computing: The role for the fourth industrial revolution. In: Proceeding of the 2017 International Conference on Information and Communication Technology Convergence (ICTC). pp. 1280–1282. IEEE, Jeju (2017)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AI Strategy for Stake Cloud Computing and Edge Computing: A State of the art survey;2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA);2021-12-02