Author:
Abedpour Kimia,Hosseini Shirvani Mirsaeid,Abedpour Elmira
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference43 articles.
1. Qiu, J., Chen, Y., Tian, Z., Guizani, N., Du, X.: The security of internet of vehicles network: adversarial examples for trajectory mode detection. IEEE Netw. 35(5), 279–283 (2021). https://doi.org/10.1109/MNET.121.2000435
2. Shayesteh, B., Hakami, V., Akbari, A.A.: Trust management scheme for IoT-enabled environmental health/accessibility monitoring services. Int. J. Inf. Secur 19, 93–110 (2020). https://doi.org/10.1007/s10207-019-00446-x
3. Brogi, A., Forti, A.: QoS-aware deployment of IoT applications through the fog. IEEE Internet Things 4, 1185–1192 (2017). https://doi.org/10.1109/JIOT.2017.2701408
4. Hosseini Shirvani, M., Rahmani, A.M., Sahafi, A.: An iterative mathematical decision model for cloud migration: a cost and security risk approach. Software 48(3), 449–485 (2018). https://doi.org/10.1002/spe.2528
5. Hosseini Shirvani, M.: To move or not to move: an iterative four-phase cloud adoption decision model for IT outsourcing based On TCO. J. Soft Comput. Inf. Technol. 9(1), 7–17 (2020)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献