Author:
J. Gillan Charles,Karakonstantis George
Reference48 articles.
1. Stojmenovic I, Wen S. The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS). Warsaw, Poland: IEEE; 2014. pp. 1-8
2. Alrawais A, Alhothaily A, Hu C, Cheng X. Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing. 2017;21(2):34-42
3. Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, et al. Security and privacy in fog computing: Challenges. IEEE Access. 2017;5:19293-19304
4. Cabric M. Corporate Security Management. Challenges, Risks, and Strategies. 1st edition. London: Butterworth-Heinemann; 2015:242. ISBN: 9780128029343
5. S Institute. Operating System Security and Secure Operating Systems [Online]. Available from: https://www.giac.org/paper/gsec/2776/operating-system-security-secure-operating-systems/104723 [Accessed: December 2017]