1. Varghese, B., Wang, N., Nikolopoulos, D.S., Buyya, R.: Feasibility of fog computing. CoRR abs/1701.0 (2017), http://arxiv.org/abs/1701.05451.
2. A game-theoretical approach for mitigating edge DDoS attack;He;IEEe Trans. Dependable Secure Comput.,2022
3. Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges;Roman;Future Generat. Comput. Syst.,2018
4. Mobile edge computing: a survey on architecture and computation offloading;Mach;IEEE Commun. Surv. Tutor.,2017
5. Optimized machine learning-based intrusion detection system for fog and edge computing environment;Alzubi;Electronics. (Basel),2022