Author:
Saraogi Vipin Kumar,Matolia Dhanesh Kumar,Kumar Jitendra,Saini Manoj Kumar,Malik A. K.
Reference25 articles.
1. Yi, S., Qin, Z., & Li, Q. (2015, August). Security and privacy issues of fog computing: A survey. In International conference on wireless algorithms, systems, and applications (pp. 685–695). Springer, Cham.
2. Hosseinpour, F., Westerlund, T., &Meng, Y. (2016). A review on fog computing systems. Int. J. Adv. Comput. Technol. HannuTenhunen, 8(5), 48–61.
3. Singh, Y., Arya, K., Malik, A. K. (2014). Inventory control with soft computing techniques. International Journal of Innovative Technology and Exploring Engineering, 3(8), 80–82.
4. Mahmud, R., Kotagiri, R., &Buyya, R. (2018). Fog computing: A taxonomy, survey and future directions. In Internet of everything (pp. 103–130). Springer, Singapore.
5. Kitanov, S., &Janevski, T. (2019). Introduction to fog computing. In The Rise of Fog Computing in the Digital Era (pp. 1–35). IGI Global.