메뉴 건너뛰기




Volumn 6, Issue 1, 2017, Pages

Fog computing security: a review of current applications and security solutions

Author keywords

Fog computing; Internet of things; Malware protection; Performance; Security threats; Wireless security

Indexed keywords

COMPUTER CRIME; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; FOG; INTERNET OF THINGS; MALWARE;

EID: 85027710475     PISSN: None     EISSN: 2192113X     Source Type: Journal    
DOI: 10.1186/s13677-017-0090-3     Document Type: Review
Times cited : (324)

References (149)
  • 1
    • 84883264517 scopus 로고    scopus 로고
    • IEEE, Big data: A review In: Collaboration Technologies and Systems (CTS), 2013 International Conference On, 42–47
    • Sagiroglu S, Sinanc D (2013) Big data: A review In: Collaboration Technologies and Systems (CTS), 2013 International Conference On, 42–47. IEEE.
    • (2013)
    • Sagiroglu, S.1    Sinanc, D.2
  • 3
    • 84959912243 scopus 로고    scopus 로고
    • ACM. A hierarchical distributed fog computing architecture for big data analysis in smart cities In: Proceedings of the ASE BigData & SocialInformatics 2015, 28
    • Tang B, Chen Z, Hefferman G, Wei T, He H, Yang Q (2015) A hierarchical distributed fog computing architecture for big data analysis in smart cities In: Proceedings of the ASE BigData & SocialInformatics 2015, 28. ACM.
    • (2015)
    • Tang, B.1    Chen, Z.2    Hefferman, G.3    Wei, T.4    He, H.5    Yang, Q.6
  • 5
    • 85014851084 scopus 로고    scopus 로고
    • Cyber threats facing autonomous and connected vehicles: future challenges
    • Parkinson S, Ward P, Wilson K, Miller J (2017) Cyber threats facing autonomous and connected vehicles: future challenges. IEEE Trans Intell Transp SystPP(99): 1–18. doi:10.1109/TITS.2017.2665968.
    • (2017) IEEE Trans Intell Transp Syst , vol.PP , Issue.99 , pp. 1-18
    • Parkinson, S.1    Ward, P.2    Wilson, K.3    Miller, J.4
  • 6
    • 84912130127 scopus 로고    scopus 로고
    • IEEE, The fog computing paradigm: Scenarios and security issues In: Computer Science and Information Systems (FedCSIS), 2014 Federated Conference On, 1–8
    • Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues In: Computer Science and Information Systems (FedCSIS), 2014 Federated Conference On, 1–8. IEEE.
    • (2014)
    • Stojmenovic, I.1    Wen, S.2
  • 8
    • 84866627419 scopus 로고    scopus 로고
    • ACM. Fog computing and its role in the internet of things In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 13–16
    • Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 13–16. ACM.
    • (2012)
    • Bonomi, F.1    Milito, R.2    Zhu, J.3    Addepalli, S.4
  • 10
    • 84996757871 scopus 로고    scopus 로고
    • Finding your way in the fog: Towards a comprehensive definition of fog computing
    • Vaquero LM, Rodero-Merino L (2014) Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev 44(5): 27–32.
    • (2014) ACM SIGCOMM Comput Commun Rev , vol.44 , Issue.5 , pp. 27-32
    • Vaquero, L.M.1    Rodero-Merino, L.2
  • 11
    • 84994864455 scopus 로고    scopus 로고
    • Fog in comparison to cloud: A survey
    • Saharan K, Kumar A (2015) Fog in comparison to cloud: A survey. Int J Comput Appl 122(3): 10–12.
    • (2015) Int J Comput Appl , vol.122 , Issue.3 , pp. 10-12
    • Saharan, K.1    Kumar, A.2
  • 16
    • 84960116587 scopus 로고    scopus 로고
    • A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets
    • Satyanarayanan M (2015) A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mob Comput Commun 18(4): 19–23.
    • (2015) GetMobile: Mob Comput Commun , vol.18 , Issue.4 , pp. 19-23
    • Satyanarayanan, M.1
  • 17
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28(3): 583–592.
    • (2012) Futur Gener Comput Syst , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 20
    • 84943612463 scopus 로고    scopus 로고
    • Security and privacy issues of fog computing: A survey In: International Conference on Wireless Algorithms, Systems, and Applications, 685–695. Springer
    • Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: A survey In: International Conference on Wireless Algorithms, Systems, and Applications, 685–695. Springer.
    • (2015)
    • Yi, S.1    Qin, Z.2    Li, Q.3
  • 22
    • 85007280420 scopus 로고    scopus 로고
    • IEEE, A survey on mobile edge computing In: Intelligent Systems and Control (ISCO), 2016 10th International Conference On, 1–8
    • Ahmed A, Ahmed E (2016) A survey on mobile edge computing In: Intelligent Systems and Control (ISCO), 2016 10th International Conference On, 1–8. IEEE.
    • (2016)
    • Ahmed, A.1    Ahmed, E.2
  • 26
    • 85027689874 scopus 로고    scopus 로고
    • IEEE, The unheralded power of cloudlet computing in the vicinity of mobile devices In: Globecom Workshops (GC Wkshps), 2013, 4994–4999. IEEE
    • Li Y, Wang W (2013) The unheralded power of cloudlet computing in the vicinity of mobile devices In: Globecom Workshops (GC Wkshps), 2013 IEEE, 4994–4999. IEEE.
    • (2013)
    • Li, Y.1    Wang, W.2
  • 29
    • 85010756872 scopus 로고    scopus 로고
    • An integrated architecture for software defined and virtualized radio access networks with fog computing
    • Liang K, Zhao L, Chu X, Chen H-H (2017) An integrated architecture for software defined and virtualized radio access networks with fog computing. IEEE Netw 31(1): 80–87.
    • (2017) IEEE Netw , vol.31 , Issue.1 , pp. 80-87
    • Liang, K.1    Zhao, L.2    Chu, X.3    Chen, H.-H.4
  • 30
    • 84861636756 scopus 로고    scopus 로고
    • IEEE, How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users In: Pervasive Computing and Communications (PerCom), 2012, International Conference On, 122–127. IEEE
    • Clinch S, Harkes J, Friday A, Davies N, Satyanarayanan M (2012) How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users In: Pervasive Computing and Communications (PerCom), 2012 IEEE International Conference On, 122–127. IEEE.
    • (2012)
    • Clinch, S.1    Harkes, J.2    Friday, A.3    Davies, N.4    Satyanarayanan, M.5
  • 31
    • 79960589881 scopus 로고    scopus 로고
    • Efficient task scheduling algorithms for cloud computing environment In: High Performance Architecture and Grid Computing, 79–83. Springer
    • Sindhu S, Mukherjee S (2011) Efficient task scheduling algorithms for cloud computing environment In: High Performance Architecture and Grid Computing, 79–83. Springer.
    • (2011)
    • Sindhu, S.1    Mukherjee, S.2
  • 35
    • 84964252966 scopus 로고    scopus 로고
    • IEEE, A new prime and probe cache side-channel attack for cloud computing In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015, International Conference On, 1718–1724. IEEE
    • Younis YA, Kifayat K, Shi Q, Askwith B (2015) A new prime and probe cache side-channel attack for cloud computing In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference On, 1718–1724. IEEE.
    • (2015)
    • Younis, Y.A.1    Kifayat, K.2    Shi, Q.3    Askwith, B.4
  • 36
    • 85011304044 scopus 로고    scopus 로고
    • Cloud computing security models, architectures, issues and challenges: A survey
    • Shahid MA, Sharif M (2015) Cloud computing security models, architectures, issues and challenges: A survey. Smart Comput Rev 5: 602–616.
    • (2015) Smart Comput Rev , vol.5 , pp. 602-616
    • Shahid, M.A.1    Sharif, M.2
  • 37
    • 84880905874 scopus 로고    scopus 로고
    • IEEE, Improving web sites performance using edge servers in fog computing architecture In: Service Oriented System Engineering (SOSE), 2013, 7th International Symposium On, 320–323. IEEE
    • Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F (2013) Improving web sites performance using edge servers in fog computing architecture In: Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium On, 320–323. IEEE.
    • (2013)
    • Zhu, J.1    Chan, D.S.2    Prabhu, M.S.3    Natarajan, P.4    Hu, H.5    Bonomi, F.6
  • 38
    • 85119542031 scopus 로고    scopus 로고
    • IEEE, Fog computing-network based cloud computing In: Electronics and Communication Systems (ICECS), 2015 2nd International Conference On, 250–251
    • Krishnan YN, Bhagwat CN, Utpat AP (2015) Fog computing-network based cloud computing In: Electronics and Communication Systems (ICECS), 2015 2nd International Conference On, 250–251. IEEE.
    • (2015)
    • Krishnan, Y.N.1    Bhagwat, C.N.2    Utpat, A.P.3
  • 39
    • 84914817681 scopus 로고    scopus 로고
    • Ubiquitous shift with information centric network caching using fog computing In: Computational Intelligence in Information Systems, 327–335. Springer
    • Abdullahi I, Arif S, Hassan S (2015) Ubiquitous shift with information centric network caching using fog computing In: Computational Intelligence in Information Systems, 327–335. Springer.
    • (2015)
    • Abdullahi, I.1    Arif, S.2    Hassan, S.3
  • 40
    • 84940980355 scopus 로고    scopus 로고
    • Steiner tree based optimal resource caching scheme in fog computing
    • Su J, Lin F, Zhou X, Lu X (2015) Steiner tree based optimal resource caching scheme in fog computing. China Commun 12(8): 161–168.
    • (2015) China Commun , vol.12 , Issue.8 , pp. 161-168
    • Su, J.1    Lin, F.2    Zhou, X.3    Lu, X.4
  • 43
    • 76549111997 scopus 로고    scopus 로고
    • Mitigating drive-by download attacks: Challenges and open problems In: iNetSec 2009–Open Research Problems in Network Security, 52–62. Springer
    • Egele M, Kirda E, Kruegel C (2009) Mitigating drive-by download attacks: Challenges and open problems In: iNetSec 2009–Open Research Problems in Network Security, 52–62. Springer.
    • (2009)
    • Egele, M.1    Kirda, E.2    Kruegel, C.3
  • 44
    • 85017956183 scopus 로고    scopus 로고
    • Fog computing and its applications in 5g In: 5G Mobile Communications, 571–593. Springer
    • Gao L, Luan TH, Liu B, Zhou W, Yu S (2017) Fog computing and its applications in 5g In: 5G Mobile Communications, 571–593. Springer.
    • (2017)
    • Gao, L.1    Luan, T.H.2    Liu, B.3    Zhou, W.4    Yu, S.5
  • 46
    • 85119305445 scopus 로고    scopus 로고
    • IEEE, The fog balancing: Load distribution for small cell cloud computing In: 2015, 81st Vehicular Technology Conference (VTC Spring), 1–6. IEEE
    • Oueis J, Strinati EC, Barbarossa S (2015) The fog balancing: Load distribution for small cell cloud computing In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 1–6. IEEE.
    • (2015)
    • Oueis, J.1    Strinati, E.C.2    Barbarossa, S.3
  • 48
    • 85027696716 scopus 로고    scopus 로고
    • Man-in-the-middle attack In: Encyclopedia of Cryptography and Security, 759–759. Springer
    • Desmedt Y (2011) Man-in-the-middle attack In: Encyclopedia of Cryptography and Security, 759–759. Springer.
    • (2011)
    • Desmedt, Y.1
  • 50
    • 84994065420 scopus 로고    scopus 로고
    • IEEE, Improved throughput for power line communication (plc) for smart meters using fog computing based data aggregation approach In: Smart Cities Conference (ISC2), 2016, International, 1–4. IEEE
    • Nazmudeen MSH, Wan AT, Buhari SM (2016) Improved throughput for power line communication (plc) for smart meters using fog computing based data aggregation approach In: Smart Cities Conference (ISC2), 2016 IEEE International, 1–4. IEEE.
    • (2016)
    • Nazmudeen, M.S.H.1    Wan, A.T.2    Buhari, S.M.3
  • 51
    • 84991383543 scopus 로고    scopus 로고
    • IEEE, A fog computing solution for advanced metering infrastructure In: Transmission and Distribution Conference and Exposition (T&D), 2016, /PES, 1–4. IEEE
    • Yan Y, Su W (2016) A fog computing solution for advanced metering infrastructure In: Transmission and Distribution Conference and Exposition (T&D), 2016 IEEE/PES, 1–4. IEEE.
    • (2016)
    • Yan, Y.1    Su, W.2
  • 52
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A comprehensive overview
    • Ozdemir S, Xiao Y (2009) Secure data aggregation in wireless sensor networks: A comprehensive overview. Comput Netw 53(12): 2022–2037.
    • (2009) Comput Netw , vol.53 , Issue.12 , pp. 2022-2037
    • Ozdemir, S.1    Xiao, Y.2
  • 53
    • 84855849799 scopus 로고    scopus 로고
    • IEEE, Smart meter privacy: A utility-privacy framework In: Smart Grid Communications (SmartGridComm), 2011, International Conference On, 190–195. IEEE
    • Rajagopalan SR, Sankar L, Mohajer S, Poor HV (2011) Smart meter privacy: A utility-privacy framework In: Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference On, 190–195. IEEE.
    • (2011)
    • Rajagopalan, S.R.1    Sankar, L.2    Mohajer, S.3    Poor, H.V.4
  • 54
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Privacy 7(3): 75–77.
    • (2009) IEEE Secur Privacy , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 56
    • 84986212926 scopus 로고    scopus 로고
    • Smart items, fog and cloud computing as enablers of servitization in healthcare
    • Stantchev V, Barnawi A, Ghulam S, Schubert J, Tamm G (2015) Smart items, fog and cloud computing as enablers of servitization in healthcare. Sensors Transducers 185(2): 121.
    • (2015) Sensors Transducers , vol.185 , Issue.2 , pp. 121
    • Stantchev, V.1    Barnawi, A.2    Ghulam, S.3    Schubert, J.4    Tamm, G.5
  • 57
    • 84954148130 scopus 로고    scopus 로고
    • IEEE, The fog computing service for healthcare In: Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015 2nd International Symposium On, 1–5
    • Shi Y, Ding G, Wang H, Roman HE, Lu S (2015) The fog computing service for healthcare In: Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015 2nd International Symposium On, 1–5. IEEE.
    • (2015)
    • Shi, Y.1    Ding, G.2    Wang, H.3    Roman, H.E.4    Lu, S.5
  • 58
    • 84964284114 scopus 로고    scopus 로고
    • IEEE, Fog computing in healthcare internet of things: A case study on ecg feature extraction In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015, International Conference On, 356–363. IEEE
    • Gia TN, Jiang M, Rahmani AM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet of things: A case study on ecg feature extraction In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference On, 356–363. IEEE.
    • (2015)
    • Gia, T.N.1    Jiang, M.2    Rahmani, A.M.3    Westerlund, T.4    Liljeberg, P.5    Tenhunen, H.6
  • 59
    • 85130943507 scopus 로고    scopus 로고
    • ACM. Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing In: Proceedings of the 2015 Workshop on Mobile Big Data, 43–48
    • Cao Y, Hou P, Brown D, Wang J, Chen S (2015) Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing In: Proceedings of the 2015 Workshop on Mobile Big Data, 43–48. ACM.
    • (2015)
    • Cao, Y.1    Hou, P.2    Brown, D.3    Wang, J.4    Chen, S.5
  • 60
    • 84960857858 scopus 로고    scopus 로고
    • IEEE, Fast: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation In: Networking, Architecture and Storage (NAS), 2015, International Conference On, 2–11. IEEE
    • Cao Y, Chen S, Hou P, Brown D (2015) Fast: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation In: Networking, Architecture and Storage (NAS), 2015 IEEE International Conference On, 2–11. IEEE.
    • (2015)
    • Cao, Y.1    Chen, S.2    Hou, P.3    Brown, D.4
  • 61
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings In: International Conference on Security and Privacy in Communication Systems, 89–106. Springer
    • Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings In: International Conference on Security and Privacy in Communication Systems, 89–106. Springer.
    • (2010)
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 62
    • 41449098948 scopus 로고    scopus 로고
    • Leds: Providing location-aware end-to-end data security in wireless sensor networks
    • Ren K, Lou W, Zhang Y (2008) Leds: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans Mobile Comput 7(5): 585–598.
    • (2008) IEEE Trans Mobile Comput , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 63
    • 84987657183 scopus 로고    scopus 로고
    • IEEE, Dynamic urban surveillance video stream processing using fog computing In: Multimedia Big Data (BigMM), 2016, Second International Conference On, 105–112. IEEE
    • Chen N, Chen Y, You Y, Ling H, Liang P, Zimmermann R (2016) Dynamic urban surveillance video stream processing using fog computing In: Multimedia Big Data (BigMM), 2016 IEEE Second International Conference On, 105–112. IEEE.
    • (2016)
    • Chen, N.1    Chen, Y.2    You, Y.3    Ling, H.4    Liang, P.5    Zimmermann, R.6
  • 64
    • 84969922595 scopus 로고    scopus 로고
    • The promise of edge computing
    • Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5): 78–81.
    • (2016) Computer , vol.49 , Issue.5 , pp. 78-81
    • Shi, W.1    Dustdar, S.2
  • 65
    • 85119306136 scopus 로고    scopus 로고
    • IEEE, A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing In: 2015 International Conference on Information Networking (ICOIN), 324–329
    • Do CT, Tran NH, Pham C, Alam MGR, Son JH, Hong CS (2015) A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing In: 2015 International Conference on Information Networking (ICOIN), 324–329. IEEE.
    • (2015)
    • Do, C.T.1    Tran, N.H.2    Pham, C.3    Alam, M.G.R.4    Son, J.H.5    Hong, C.S.6
  • 66
    • 84904061089 scopus 로고    scopus 로고
    • A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks
    • Varalakshmi L, Sudha GF, Jaikishan G (2014) A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks. Telecommun Syst 56(3): 357–365.
    • (2014) Telecommun Syst , vol.56 , Issue.3 , pp. 357-365
    • Varalakshmi, L.1    Sudha, G.F.2    Jaikishan, G.3
  • 67
    • 85119546730 scopus 로고    scopus 로고
    • IEEE, Software defined networking-based vehicular adhoc network with fog computing In: 2015 IFIP/, International Symposium on Integrated Network Management (IM), 1202–1207. IEEE
    • Truong NB, Lee GM, Ghamri-Doudane Y (2015) Software defined networking-based vehicular adhoc network with fog computing In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 1202–1207. IEEE.
    • (2015)
    • Truong, N.B.1    Lee, G.M.2    Ghamri-Doudane, Y.3
  • 68
    • 84953311242 scopus 로고    scopus 로고
    • IEEE, Fog computing architecture to enable consumer centric internet of things services In: 2015 International Symposium on Consumer Electronics (ISCE), 1–2
    • Datta SK, Bonnet C, Haerri J (2015) Fog computing architecture to enable consumer centric internet of things services In: 2015 International Symposium on Consumer Electronics (ISCE), 1–2. IEEE.
    • (2015)
    • Datta, S.K.1    Bonnet, C.2    Haerri, J.3
  • 69
    • 84965033218 scopus 로고    scopus 로고
    • A fog-based dss model for driving rule violation monitoring framework on the internet of things
    • Roy S, Bose R, Sarddar D (2015) A fog-based dss model for driving rule violation monitoring framework on the internet of things. Int J Adv Sci Technol 82: 23–32.
    • (2015) Int J Adv Sci Technol , vol.82 , pp. 23-32
    • Roy, S.1    Bose, R.2    Sarddar, D.3
  • 70
    • 84992202684 scopus 로고    scopus 로고
    • IEEE, Mitigating dynamic dos attacks in mobile ad hoc network In: Colossal Data Analysis and Networking (CDAN), Symposium On, 1–7
    • Joshi B, Singh NK (2016) Mitigating dynamic dos attacks in mobile ad hoc network In: Colossal Data Analysis and Networking (CDAN), Symposium On, 1–7. IEEE.
    • (2016)
    • Joshi, B.1    Singh, N.K.2
  • 71
    • 85003604013 scopus 로고    scopus 로고
    • Aodv-authentication mechanism in manet
    • Defta LC, Iacob NM (2016) Aodv-authentication mechanism in manet. Calitatea 17(S3): 59.
    • (2016) Calitatea , vol.17 , Issue.S3 , pp. 59
    • Defta, L.C.1    Iacob, N.M.2
  • 72
    • 84989942587 scopus 로고    scopus 로고
    • An intelligent value stream-based approach to collaboration of food traceability cyber physical system by fog computing
    • Chen RY (2017) An intelligent value stream-based approach to collaboration of food traceability cyber physical system by fog computing. Food Control 71: 124–136.
    • (2017) Food Control , vol.71 , pp. 124-136
    • Chen, R.Y.1
  • 74
  • 75
    • 84964689396 scopus 로고    scopus 로고
    • IEEE, Computing at the mobile edge: Designing elastic android applications for computation offloading In: IFIP Wireless and Mobile Networking Conference (WMNC), 2015 8th, 112–119
    • Orsini G, Bade D, Lamersdorf W (2015) Computing at the mobile edge: Designing elastic android applications for computation offloading In: IFIP Wireless and Mobile Networking Conference (WMNC), 2015 8th, 112–119. IEEE.
    • (2015)
    • Orsini, G.1    Bade, D.2    Lamersdorf, W.3
  • 77
    • 84869035513 scopus 로고    scopus 로고
    • IEEE, Malicious android applications in the enterprise: What do they do and how do we fix it? In: Data Engineering Workshops (ICDEW), 2012, 28th International Conference On, 251–254. IEEE
    • Wei X, Gomez L, Neamtiu I, Faloutsos M (2012) Malicious android applications in the enterprise: What do they do and how do we fix it? In: Data Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference On, 251–254. IEEE.
    • (2012)
    • Wei, X.1    Gomez, L.2    Neamtiu, I.3    Faloutsos, M.4
  • 78
    • 84964811586 scopus 로고    scopus 로고
    • Analysis of malicious behavior of android apps
    • Singh P, Tiwari P, Singh S (2016) Analysis of malicious behavior of android apps. Procedia Comput Sci 79: 215–220.
    • (2016) Procedia Comput Sci , vol.79 , pp. 215-220
    • Singh, P.1    Tiwari, P.2    Singh, S.3
  • 79
    • 84908631947 scopus 로고    scopus 로고
    • IEEE, Augmented brain computer interaction based on fog computing and linked data In: Intelligent Environments (IE), 2014 International Conference On, 374–377
    • Zao JK, Gan TT, You CK, Méndez SJR, Chung CE, Te Wang Y, Mullen T, Jung TP (2014) Augmented brain computer interaction based on fog computing and linked data In: Intelligent Environments (IE), 2014 International Conference On, 374–377. IEEE.
    • (2014)
    • Zao, J.K.1    Gan, T.T.2    You, C.K.3    Méndez, S.J.R.4    Chung, C.E.5    Te Wang, Y.6    Mullen, T.7    Jung, T.P.8
  • 81
    • 84960118857 scopus 로고    scopus 로고
    • ACM. Fog data: enhancing telehealth big data through fog computing In: Proceedings of the ASE BigData & SocialInformatics 2015, 14
    • Dubey H, Yang J, Constant N, Amiri AM, Yang Q, Makodiya K (2015) Fog data: enhancing telehealth big data through fog computing In: Proceedings of the ASE BigData & SocialInformatics 2015, 14. ACM.
    • (2015)
    • Dubey, H.1    Yang, J.2    Constant, N.3    Amiri, A.M.4    Yang, Q.5    Makodiya, K.6
  • 82
    • 85007566242 scopus 로고    scopus 로고
    • ACM. Efficient authentication of resource-constrained iot devices based on ecqv implicit certificates and datagram transport layer security protocol In: Proceedings of the Seventh Symposium on Information and Communication Technology, 173–179
    • Ha DA, Nguyen KT, Zao JK (2016) Efficient authentication of resource-constrained iot devices based on ecqv implicit certificates and datagram transport layer security protocol In: Proceedings of the Seventh Symposium on Information and Communication Technology, 173–179. ACM.
    • (2016)
    • Ha, D.A.1    Nguyen, K.T.2    Zao, J.K.3
  • 83
    • 85119709459 scopus 로고    scopus 로고
    • IEEE, Fog computing micro datacenter based dynamic resource estimation and pricing model for iot In: 2015, 29th International Conference on Advanced Information Networking and Applications, 687–694. IEEE
    • Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for iot In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 687–694. IEEE.
    • (2015)
    • Aazam, M.1    Huh, E.N.2
  • 84
    • 84986211321 scopus 로고    scopus 로고
    • Fog computing: Helping the internet of things realize its potential
    • Dastjerdi AV, Buyya R (2016) Fog computing: Helping the internet of things realize its potential. Computer 49(8): 112–116.
    • (2016) Computer , vol.49 , Issue.8 , pp. 112-116
    • Dastjerdi, A.V.1    Buyya, R.2
  • 85
    • 84947798047 scopus 로고    scopus 로고
    • Fully secure fuzzy identity-based encryption for secure iot communications
    • Mao Y, Li J, Chen MR, Liu J, Xie C, Zhan Y (2016) Fully secure fuzzy identity-based encryption for secure iot communications. Comput Standards Interfaces 44: 117–121.
    • (2016) Comput Standards Interfaces , vol.44 , pp. 117-121
    • Mao, Y.1    Li, J.2    Chen, M.R.3    Liu, J.4    Xie, C.5    Zhan, Y.6
  • 88
    • 84953720896 scopus 로고    scopus 로고
    • IEEE, Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing In: 2015, International Conference on Communications (ICC), 3909–3914. IEEE
    • Deng R, Lu R, Lai C, Luan TH (2015) Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing In: 2015 IEEE International Conference on Communications (ICC), 3909–3914. IEEE.
    • (2015)
    • Deng, R.1    Lu, R.2    Lai, C.3    Luan, T.H.4
  • 90
    • 84962038954 scopus 로고    scopus 로고
    • Towards achieving data security with the cloud computing adoption framework
    • Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1): 138–151.
    • (2016) IEEE Trans Serv Comput , vol.9 , Issue.1 , pp. 138-151
    • Chang, V.1    Ramachandran, M.2
  • 93
    • 84912553395 scopus 로고    scopus 로고
    • IEEE, Tactical cloudlets: Moving cloud computing to the edge In: Military Communications Conference (MILCOM), 2014, 1440–1446. IEEE
    • Lewis G, Echeverría S, Simanta S, Bradshaw B, Root J (2014) Tactical cloudlets: Moving cloud computing to the edge In: Military Communications Conference (MILCOM), 2014 IEEE, 1440–1446. IEEE.
    • (2014)
    • Lewis, G.1    Echeverría, S.2    Simanta, S.3    Bradshaw, B.4    Root, J.5
  • 94
    • 85027709371 scopus 로고    scopus 로고
    • Performance analysis of wireless network throughput and security protocol integration
    • Ochang PA, Irving P (2016) Performance analysis of wireless network throughput and security protocol integration. Int J Future Generation Commun Netw 9(1): 71–78.
    • (2016) Int J Future Generation Commun Netw , vol.9 , Issue.1 , pp. 71-78
    • Ochang, P.A.1    Irving, P.2
  • 95
    • 84949922231 scopus 로고    scopus 로고
    • IEEE, Preserving privacy in sensor-fog networks In: Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference For, 96–99
    • Kulkarni S, Saha S, Hockenbury R (2014) Preserving privacy in sensor-fog networks In: Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference For, 96–99. IEEE.
    • (2014)
    • Kulkarni, S.1    Saha, S.2    Hockenbury, R.3
  • 96
    • 84864275237 scopus 로고    scopus 로고
    • IEEE, Fog computing: Mitigating insider data theft attacks in the cloud In: Security and Privacy Workshops (SPW), 2012, Symposium On, 125–128. IEEE
    • Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: Mitigating insider data theft attacks in the cloud In: Security and Privacy Workshops (SPW), 2012 IEEE Symposium On, 125–128. IEEE.
    • (2012)
    • Stolfo, S.J.1    Salem, M.B.2    Keromytis, A.D.3
  • 97
    • 84859368129 scopus 로고    scopus 로고
    • Replicates and repeats-what is the difference and is it significant?
    • Vaux DL, Fidler F, Cumming G (2012) Replicates and repeats-what is the difference and is it significant?EMBO Reports 13(4): 291–296.
    • (2012) EMBO Reports , vol.13 , Issue.4 , pp. 291-296
    • Vaux, D.L.1    Fidler, F.2    Cumming, G.3
  • 99
    • 85027684949 scopus 로고    scopus 로고
    • Fog computing: Comprehensive approach for security data theft attack using elliptic curve cryptography and decoy technology
    • Dong MT, Zhou X (2016) Fog computing: Comprehensive approach for security data theft attack using elliptic curve cryptography and decoy technology. Open Access Library J 3(09): 1.
    • (2016) Open Access Library J , vol.3 , Issue.9 , pp. 1
    • Dong, M.T.1    Zhou, X.2
  • 100
    • 84941286216 scopus 로고    scopus 로고
    • IEEE, Policy-driven security management for fog computing: Preliminary framework and a case study In: Information Reuse and Integration (IRI), 2014, 15th International Conference On, 16–23. IEEE
    • Dsouza C, Ahn GJ, Taguinod M (2014) Policy-driven security management for fog computing: Preliminary framework and a case study In: Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference On, 16–23. IEEE.
    • (2014)
    • Dsouza, C.1    Ahn, G.J.2    Taguinod, M.3
  • 101
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • Mirkovic J, Reiher P (2004) A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2): 39–53.
    • (2004) ACM SIGCOMM Comput Commun Rev , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 102
    • 84908583823 scopus 로고    scopus 로고
    • IEEE, Towards mitigation of low and slow application ddos attacks In: Cloud Engineering (IC2E), 2014, International Conference On, 604–609. IEEE
    • Shtern M, Sandel R, Litoiu M, Bachalo C, Theodorou V (2014) Towards mitigation of low and slow application ddos attacks In: Cloud Engineering (IC2E), 2014 IEEE International Conference On, 604–609. IEEE.
    • (2014)
    • Shtern, M.1    Sandel, R.2    Litoiu, M.3    Bachalo, C.4    Theodorou, V.5
  • 104
    • 85019545969 scopus 로고    scopus 로고
    • Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling In: International Conference on Cryptology in Africa, 184–201. Springer
    • Bos JW, Castryck W, Iliashenko I, Vercauteren F (2017) Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling In: International Conference on Cryptology in Africa, 184–201. Springer.
    • (2017)
    • Bos, J.W.1    Castryck, W.2    Iliashenko, I.3    Vercauteren, F.4
  • 105
    • 84864583229 scopus 로고    scopus 로고
    • Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
    • Lu R, Liang X, Li X, Lin X, Shen X (2012) Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distributed Syst 23(9): 1621–1631.
    • (2012) IEEE Trans Parallel Distributed Syst , vol.23 , Issue.9 , pp. 1621-1631
    • Lu, R.1    Liang, X.2    Li, X.3    Lin, X.4    Shen, X.5
  • 107
    • 84939500265 scopus 로고    scopus 로고
    • A study of encryption algorithms aes, des and rsa for security
    • Mahajan P, Sachdeva A (2013) A study of encryption algorithms aes, des and rsa for security. Global J Comput Sci Technol 13(15): 15–22.
    • (2013) Global J Comput Sci Technol , vol.13 , Issue.15 , pp. 15-22
    • Mahajan, P.1    Sachdeva, A.2
  • 108
    • 73349112862 scopus 로고    scopus 로고
    • Database encryption: an overview of contemporary challenges and design considerations
    • Shmueli E, Vaisenberg R, Elovici Y, Glezer C (2010) Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Record 38(3): 29–34.
    • (2010) ACM SIGMOD Record , vol.38 , Issue.3 , pp. 29-34
    • Shmueli, E.1    Vaisenberg, R.2    Elovici, Y.3    Glezer, C.4
  • 109
    • 85027726431 scopus 로고    scopus 로고
    • SEcube (TM): Data at rest and data in motion protection
    • The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Athens
    • Varriale A, Prinetto P, Carelli A, Trotta P (2016) SEcube (TM): Data at rest and data in motion protection In: Proceedings of the International Conference on Security and Management (SAM), 138–144. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Athens.
    • (2016) Proceedings of the International Conference on Security and Management (SAM) , pp. 138-144
    • Varriale, A.1    Prinetto, P.2    Carelli, A.3    Trotta, P.4
  • 111
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing In: European Symposium on Research in Computer Security, 355–370. Springer
    • Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing In: European Symposium on Research in Computer Security, 355–370. Springer.
    • (2009)
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 112
    • 1942441379 scopus 로고    scopus 로고
    • Defending against cache-based side-channel attacks
    • Page D (2003) Defending against cache-based side-channel attacks. Inf Security Technical Rep 8(1): 30–44.
    • (2003) Inf Security Technical Rep , vol.8 , Issue.1 , pp. 30-44
    • Page, D.1
  • 113
    • 79960321311 scopus 로고    scopus 로고
    • Trace-driven cache attacks on aes (short paper) In: International Conference on Information and Communications Security, 112–121
    • Koç K
    • Acıiçmez O, Koç Ç,K (2006) Trace-driven cache attacks on aes (short paper) In: International Conference on Information and Communications Security, 112–121. Springer.
    • (2006) Springer
    • Acıiçmez, O.1
  • 114
    • 85027713338 scopus 로고    scopus 로고
    • ACM. Security testing of a secure cache design In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 3
    • Liu F, Lee RB (2013) Security testing of a secure cache design In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 3. ACM.
    • (2013)
    • Liu, F.1    Lee, R.B.2
  • 115
    • 85073538603 scopus 로고    scopus 로고
    • Usenix, STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud In: USENIX Security Symposium, 189–204
    • Kim T, Peinado M, Mainar-Ruiz G (2012) STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud In: USENIX Security Symposium, 189–204. Usenix.
    • (2012)
    • Kim, T.1    Peinado, M.2    Mainar-Ruiz, G.3
  • 116
    • 70349236164 scopus 로고    scopus 로고
    • ACM. Deconstructing new cache designs for thwarting software cache-based side channel attacks In: Proceedings of the 2nd ACM Workshop on Computer Security Architectures, 25–34
    • Kong J, Aciicmez O, Seifert JP, Zhou H (2008) Deconstructing new cache designs for thwarting software cache-based side channel attacks In: Proceedings of the 2nd ACM Workshop on Computer Security Architectures, 25–34. ACM.
    • (2008)
    • Kong, J.1    Aciicmez, O.2    Seifert, J.P.3    Zhou, H.4
  • 117
    • 84913593468 scopus 로고    scopus 로고
    • A survey on software-defined network and openflow: From concept to implementation
    • Hu F, Hao Q, Bao K (2014) A survey on software-defined network and openflow: From concept to implementation. IEEE Commun Surv Tutorials 16(4): 2181–2206.
    • (2014) IEEE Commun Surv Tutorials , vol.16 , Issue.4 , pp. 2181-2206
    • Hu, F.1    Hao, Q.2    Bao, K.3
  • 118
    • 84874562245 scopus 로고    scopus 로고
    • IEEE, Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) In: Network Protocols (ICNP), 2012 20th, International Conference On, 1–6. IEEE
    • Shin S, Gu G (2012) Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) In: Network Protocols (ICNP), 2012 20th IEEE International Conference On, 1–6. IEEE.
    • (2012)
    • Shin, S.1    Gu, G.2
  • 119
    • 84904166671 scopus 로고    scopus 로고
    • IEEE, Payless: A low cost network monitoring framework for software defined networks In: Network Operations and Management Symposium (NOMS), 2014, 1–9. IEEE
    • Chowdhury SR, Bari MF, Ahmed R, Boutaba R (2014) Payless: A low cost network monitoring framework for software defined networks In: Network Operations and Management Symposium (NOMS), 2014 IEEE, 1–9. IEEE.
    • (2014)
    • Chowdhury, S.R.1    Bari, M.F.2    Ahmed, R.3    Boutaba, R.4
  • 121
    • 84916918767 scopus 로고    scopus 로고
    • A survey of information security incident handling in the cloud
    • Ab Rahman NH, Choo K-KR (2015) A survey of information security incident handling in the cloud. Comput Secur 49: 45–69.
    • (2015) Comput Secur , vol.49 , pp. 45-69
    • Ab Rahman, N.H.1    Choo, K.-K.R.2
  • 122
    • 84904994660 scopus 로고    scopus 로고
    • Monitoring and analyzing big traffic data of a large-scale cellular network with hadoop
    • Liu J, Liu F, Ansari N (2014) Monitoring and analyzing big traffic data of a large-scale cellular network with hadoop. IEEE Netw 28(4): 32–39.
    • (2014) IEEE Netw , vol.28 , Issue.4 , pp. 32-39
    • Liu, J.1    Liu, F.2    Ansari, N.3
  • 123
    • 85027713712 scopus 로고    scopus 로고
    • Intelligent firewall using intrusion detection system based on neural networks
    • Sawant MD, Phatak MM, Ranavde MA, Laxamanan NR (2015) Intelligent firewall using intrusion detection system based on neural networks. J Netw Inf Security 2(2): 14–17.
    • (2015) J Netw Inf Security , vol.2 , Issue.2 , pp. 14-17
    • Sawant, M.D.1    Phatak, M.M.2    Ranavde, M.A.3    Laxamanan, N.R.4
  • 124
    • 85010023746 scopus 로고    scopus 로고
    • Malware detection in cloud computing
    • Hatem SS, El-Khouly MM, et al. (2014) Malware detection in cloud computing. Int J Adv Comput Sci Appl 5(4): 187–192.
    • (2014) Int J Adv Comput Sci Appl , vol.5 , Issue.4 , pp. 187-192
    • Hatem, S.S.1    El-Khouly, M.M.2
  • 125
    • 85020871884 scopus 로고    scopus 로고
    • A survey on various malware detection techniques on mobile platform
    • Malhotra A, Bajaj K (2016) A survey on various malware detection techniques on mobile platform. Int J Comput Appl 139(5): 15–20.
    • (2016) Int J Comput Appl , vol.139 , Issue.5 , pp. 15-20
    • Malhotra, A.1    Bajaj, K.2
  • 127
    • 85076301604 scopus 로고    scopus 로고
    • Barecloud: Bare-metal analysis-based evasive malware detection
    • Usenix, University of California, Santa Barbara
    • Kirat D, Vigna G, Kruegel C (2014) Barecloud: Bare-metal analysis-based evasive malware detection In: USENIX Security, 287–301. Usenix, University of California, Santa Barbara.
    • (2014) USENIX Security , pp. 287-301
    • Kirat, D.1    Vigna, G.2    Kruegel, C.3
  • 128
    • 84883108795 scopus 로고    scopus 로고
    • IEEE, Combining supervised and unsupervised learning for zero-day malware detection In: INFOCOM, 2013 Proceedings, 2022–2030. IEEE
    • Comar PM, Liu L, Saha S, Tan PN, Nucci A (2013) Combining supervised and unsupervised learning for zero-day malware detection In: INFOCOM, 2013 Proceedings IEEE, 2022–2030. IEEE.
    • (2013)
    • Comar, P.M.1    Liu, L.2    Saha, S.3    Tan, P.N.4    Nucci, A.5
  • 130
    • 84906830290 scopus 로고    scopus 로고
    • IEEE, Detection of zero-day malware based on the analysis of opcode sequences In: Consumer Communications and Networking Conference (CCNC), 2014, 11th, 386–391. IEEE
    • Zolotukhin M, Hamalainen T (2014) Detection of zero-day malware based on the analysis of opcode sequences In: Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th, 386–391. IEEE.
    • (2014)
    • Zolotukhin, M.1    Hamalainen, T.2
  • 131
    • 84888412363 scopus 로고    scopus 로고
    • Smm rootkit: a new breed of os independent malware
    • Embleton S, Sparks S, Zou CC (2013) Smm rootkit: a new breed of os independent malware. Secur Commun Netw 6(12): 1590–1605.
    • (2013) Secur Commun Netw , vol.6 , Issue.12 , pp. 1590-1605
    • Embleton, S.1    Sparks, S.2    Zou, C.C.3
  • 132
    • 84922575268 scopus 로고    scopus 로고
    • IEEE, Fog computing and smart gateway based communication for cloud of things In: Future Internet of Things and Cloud (FiCloud), 2014 International Conference On, 464–470
    • Aazam M, Huh EN (2014) Fog computing and smart gateway based communication for cloud of things In: Future Internet of Things and Cloud (FiCloud), 2014 International Conference On, 464–470. IEEE.
    • (2014)
    • Aazam, M.1    Huh, E.N.2
  • 133
    • 84860253312 scopus 로고    scopus 로고
    • Security and privacy issues in wireless sensor networks for healthcare applications
    • Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1): 93–101.
    • (2012) J Med Syst , vol.36 , Issue.1 , pp. 93-101
    • Al Ameen, M.1    Liu, J.2    Kwak, K.3
  • 134
    • 85027681321 scopus 로고    scopus 로고
    • Security in wireless sensor networks: issues and challenges In: Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol. 2, 6
    • Pathan A-SK, Lee HW, Hong CS (2006) Security in wireless sensor networks: issues and challenges In: Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol. 2, 6. IEEE.
    • (2006) IEEE
    • Pathan, A.-S.K.1    Lee, H.W.2    Hong, C.S.3
  • 135
    • 84923009701 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile cloud computing in heterogeneous 5g
    • Gai K, Qiu M, Tao L, Zhu Y (2015) Intrusion detection techniques for mobile cloud computing in heterogeneous 5g. Secur Commun Netw 10: 3049–3058.
    • (2015) Secur Commun Netw , vol.10 , pp. 3049-3058
    • Gai, K.1    Qiu, M.2    Tao, L.3    Zhu, Y.4
  • 136
    • 84955710198 scopus 로고    scopus 로고
    • Survey on security issues in vehicular ad hoc networks
    • Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc networks. Alexandria Eng J 54(4): 1115–1126.
    • (2015) Alexandria Eng J , vol.54 , Issue.4 , pp. 1115-1126
    • Mokhtar, B.1    Azab, M.2
  • 137
    • 85027680959 scopus 로고    scopus 로고
    • Security and privacy in vehicular ad-hoc networks: survey and the road ahead In: Wireless Networks and Security, 107–132. Springer
    • Razzaque M, Salehi A, Cheraghi SM (2013) Security and privacy in vehicular ad-hoc networks: survey and the road ahead In: Wireless Networks and Security, 107–132. Springer.
    • (2013)
    • Razzaque, M.1    Salehi, A.2    Cheraghi, S.M.3
  • 138
    • 84923030214 scopus 로고    scopus 로고
    • Trust on the security of wireless vehicular ad-hoc networking
    • Rawat DB, Yan G, Bista BB, Weigle MC (2015) Trust on the security of wireless vehicular ad-hoc networking. Ad Hoc Sensor Wireless Netw 24(3-4): 283–305.
    • (2015) Ad Hoc Sensor Wireless Netw , vol.24 , Issue.3-4 , pp. 283-305
    • Rawat, D.B.1    Yan, G.2    Bista, B.B.3    Weigle, M.C.4
  • 139
    • 84989947101 scopus 로고    scopus 로고
    • IEEE, A stateless time-based authenticated-message protocol for wireless sensor networks (stamp) In: Wireless Communications and Networking Conference (WCNC), 2016, 1–6. IEEE
    • Boumerdassi S, Renault É, Muhlethaler P (2016) A stateless time-based authenticated-message protocol for wireless sensor networks (stamp) In: Wireless Communications and Networking Conference (WCNC), 2016 IEEE, 1–6. IEEE.
    • (2016)
    • Boumerdassi, S.1    Renault, É.2    Muhlethaler, P.3
  • 140
    • 78649986128 scopus 로고    scopus 로고
    • ACM. Multi-tenant saas applications: maintenance dream or nightmare? In: Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), 88–92
    • Bezemer CP, Zaidman A (2010) Multi-tenant saas applications: maintenance dream or nightmare? In: Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), 88–92. ACM.
    • (2010)
    • Bezemer, C.P.1    Zaidman, A.2
  • 141
    • 84903642496 scopus 로고    scopus 로고
    • IEEE, Multi-tenancy in cloud computing In: Service Oriented System Engineering (SOSE), 2014, 8th International Symposium On, 344–351. IEEE
    • AlJahdali H, Albatli A, Garraghan P, Townend P, Lau L, Xu J (2014) Multi-tenancy in cloud computing In: Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium On, 344–351. IEEE.
    • (2014)
    • AlJahdali, H.1    Albatli, A.2    Garraghan, P.3    Townend, P.4    Lau, L.5    Xu, J.6
  • 143
    • 84957679321 scopus 로고    scopus 로고
    • IEEE, Serene: on establishing secure and resilient networking services for an sdn-based multi-tenant datacenter environment In: Dependable Systems and Networks Workshops (DSN-W), 2015, International Conference On, 4–11. IEEE
    • Chung CJ, Xing T, Huang D, Medhi D, Trivedi K (2015) Serene: on establishing secure and resilient networking services for an sdn-based multi-tenant datacenter environment In: Dependable Systems and Networks Workshops (DSN-W), 2015 IEEE International Conference On, 4–11. IEEE.
    • (2015)
    • Chung, C.J.1    Xing, T.2    Huang, D.3    Medhi, D.4    Trivedi, K.5
  • 146
    • 84925307605 scopus 로고    scopus 로고
    • IEEE, Overview of data backup and disaster recovery in cloud In: Information Communication and Embedded Systems (ICICES), 2014 International Conference On, 1–7
    • Suguna S, Suhasini A (2014) Overview of data backup and disaster recovery in cloud In: Information Communication and Embedded Systems (ICICES), 2014 International Conference On, 1–7. IEEE.
    • (2014)
    • Suguna, S.1    Suhasini, A.2
  • 147
    • 85021242747 scopus 로고    scopus 로고
    • IEEE, Ssd-assisted backup and recovery for database systems In: Data Engineering (ICDE), 2017, 33rd International Conference On, 285–296. IEEE
    • Son Y, Choi J, Jeon J, Min C, Kim S, Yeom HY, Han H (2017) Ssd-assisted backup and recovery for database systems In: Data Engineering (ICDE), 2017 IEEE 33rd International Conference On, 285–296. IEEE.
    • (2017)
    • Son, Y.1    Choi, J.2    Jeon, J.3    Min, C.4    Kim, S.5    Yeom, H.Y.6    Han, H.7
  • 148
    • 84949680616 scopus 로고    scopus 로고
    • Vmbackup: an efficient framework for online virtual machine image backup and recovery
    • Zeng L, Xu S, Wang Y (2016) Vmbackup: an efficient framework for online virtual machine image backup and recovery. Concurrency Comput Pract Experience 28(9): 2630–2643.
    • (2016) Concurrency Comput Pract Experience , vol.28 , Issue.9 , pp. 2630-2643
    • Zeng, L.1    Xu, S.2    Wang, Y.3
  • 149
    • 85009458357 scopus 로고    scopus 로고
    • Distinguishing between expert and statistical systems for application under ICH M7
    • Barber C, Hanser T, Judson P, Williams R (2017) Distinguishing between expert and statistical systems for application under ICH M7. Regulatory Toxicol Pharmacol 84: 124–130.
    • (2017) Regulatory Toxicol Pharmacol , vol.84 , pp. 124-130
    • Barber, C.1    Hanser, T.2    Judson, P.3    Williams, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.