Author:
Gillan Charles J.,Guilhot Denis
Publisher
Springer International Publishing
Reference47 articles.
1. I. Stojmenovic, S. Wen, The fog computing paradigm: Scenarios and security issues, in 2014 Federated Conference on Computer Science and Information Systems (FedCSIS) (IEEE, 2014), pp. 1−8
2. A. Alrawais, A. Alhothaily, C. Hu, X. Cheng, Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)
3. M. Mukherjee, R. Matam, L. Shu, L. Maglaras, M.A. Ferrag, N. Choudhury, et al., Security and privacy in fog computing: Challenges. IEEE Access 5, 19293–19304 (2017)
4. International Telecommunications Union Recommendation ITU-R V.431-8, Nomenclature of the frequency and wavelength bands used in telecommunications (2015) Accessible on the web at https://www.itu.int/dms_pubrec/itu-r/rec/v/R-REC-V.431-8-201508-I!!PDF-E.pdf
5. D.L. Sengupta, V.V. Liepa, Applied electromagnetics and electromagnetic compatibility (Wiley, Hoboken, 2005), p. 467. ISBN 0-471-16549-2