1. Bellendorf, J., Mann, Z.Á.: Classification of optimization problems in fog computing. Future Gener. Comput. Syst. 107, 158–176 (2020)
2. Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16 (2012)
3. Chakravarthy, A., Wiegand, S., Chen, W., Nasser, B., Surridge, M.: Trustworthy systems design using semantic risk modelling. In: Proceedings of 1st International Conference on Cyber Security for Sustainable Society, pp. 49–81 (2015)
4. Goeke, L., Heisel, M., Mohammadi, N., Surridge, M.: Systematic risk assessment of cloud computing systems using a combined model-based approach. In: 22nd International Conference on Enterprise Information Systems, Prague, May 2020. to appear (2020)
5. He, T., Ciftcioglu, E.N., Wang, S., Chan, K.S.: Location privacy in mobile edge clouds: a chaff-based approach. IEEE J. Sel. Areas Commun. 35(11), 2625–2636 (2017)