Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference26 articles.
1. Hou, Y., Garg, S., Hui, L., Jayakody, D.N.K., Jin, R., Hossain, M.S.: A data security enhanced access control mechanism in mobile edge computing. IEEE Access 8, 136119–136130 (2020)
2. Shafiq, M., Tian, Z., Bashir, A.K., Jolfaei, A., Yu, X.: Data mining and machine learning methods for anomaly and intrusion traffic classification: a survey. Sustain. Cities Soc. Elsevier (2020)
3. Khan, S., Kifayat, K., Bashir, A.K., Gurtov, A., Hassan. M.: Intelligent intrusion detection system in smart grid using computational intelligence and machine learning. Trans. Emerg. Telecommun. Technol. (2020)
4. Ma, X.Y.: Research on trusted cooperative mechanism based on edge computing, M.S. thesis, Dept. Abbrev., Beijing Univ. Posts Telecommun., Beijing, China (2019)
5. Bashir, A.K., Arul, R., Jayaram, R., Arulappan, A., Prathiba, S.B.: An optimal multitier resource allocation of cloud RAN in 5G using machine learning. Transactions on Emerging Telecommunications Technologies, Wiley (2019)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献