-
1
-
-
84883264517
-
-
IEEE, Big data: A review In: Collaboration Technologies and Systems (CTS), 2013 International Conference On, 42–47
-
Sagiroglu S, Sinanc D (2013) Big data: A review In: Collaboration Technologies and Systems (CTS), 2013 International Conference On, 42–47. IEEE.
-
(2013)
-
-
Sagiroglu, S.1
Sinanc, D.2
-
3
-
-
84959912243
-
-
ACM. A hierarchical distributed fog computing architecture for big data analysis in smart cities In: Proceedings of the ASE BigData & SocialInformatics 2015, 28
-
Tang B, Chen Z, Hefferman G, Wei T, He H, Yang Q (2015) A hierarchical distributed fog computing architecture for big data analysis in smart cities In: Proceedings of the ASE BigData & SocialInformatics 2015, 28. ACM.
-
(2015)
-
-
Tang, B.1
Chen, Z.2
Hefferman, G.3
Wei, T.4
He, H.5
Yang, Q.6
-
4
-
-
79951515545
-
Cloud computing-the business perspective
-
Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011) Cloud computing-the business perspective. Decis Support Syst 51(1): 176–189.
-
(2011)
Decis Support Syst
, vol.51
, Issue.1
, pp. 176-189
-
-
Marston, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
5
-
-
85014851084
-
Cyber threats facing autonomous and connected vehicles: future challenges
-
Parkinson S, Ward P, Wilson K, Miller J (2017) Cyber threats facing autonomous and connected vehicles: future challenges. IEEE Trans Intell Transp SystPP(99): 1–18. doi:10.1109/TITS.2017.2665968.
-
(2017)
IEEE Trans Intell Transp Syst
, vol.PP
, Issue.99
, pp. 1-18
-
-
Parkinson, S.1
Ward, P.2
Wilson, K.3
Miller, J.4
-
6
-
-
84912130127
-
-
IEEE, The fog computing paradigm: Scenarios and security issues In: Computer Science and Information Systems (FedCSIS), 2014 Federated Conference On, 1–8
-
Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues In: Computer Science and Information Systems (FedCSIS), 2014 Federated Conference On, 1–8. IEEE.
-
(2014)
-
-
Stojmenovic, I.1
Wen, S.2
-
7
-
-
84899758434
-
-
IEEE,2013, 5th International Conference On, IEEE
-
Kim JY, Schulzrinne H (2013) Cloud support for latency-sensitive telephony applications In: Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference On, vol. 1, 421–426. IEEE.
-
(2013)
Cloud support for latency-sensitive telephony applications In: Cloud Computing Technology and Science (CloudCom)
, vol.1
-
-
Kim, J.Y.1
Schulzrinne, H.2
-
8
-
-
84866627419
-
-
ACM. Fog computing and its role in the internet of things In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 13–16
-
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 13–16. ACM.
-
(2012)
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
10
-
-
84996757871
-
Finding your way in the fog: Towards a comprehensive definition of fog computing
-
Vaquero LM, Rodero-Merino L (2014) Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev 44(5): 27–32.
-
(2014)
ACM SIGCOMM Comput Commun Rev
, vol.44
, Issue.5
, pp. 27-32
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
-
11
-
-
84994864455
-
Fog in comparison to cloud: A survey
-
Saharan K, Kumar A (2015) Fog in comparison to cloud: A survey. Int J Comput Appl 122(3): 10–12.
-
(2015)
Int J Comput Appl
, vol.122
, Issue.3
, pp. 10-12
-
-
Saharan, K.1
Kumar, A.2
-
12
-
-
84979541826
-
-
preprint arXiv:1601.02752
-
Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: Principals, architectures, and applications. arXiv preprint arXiv:1601.02752.
-
(2016)
Fog computing: Principals, architectures, and applications. arXiv
-
-
Dastjerdi, A.V.1
Gupta, H.2
Calheiros, R.N.3
Ghosh, S.K.4
Buyya, R.5
-
16
-
-
84960116587
-
A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets
-
Satyanarayanan M (2015) A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mob Comput Commun 18(4): 19–23.
-
(2015)
GetMobile: Mob Comput Commun
, vol.18
, Issue.4
, pp. 19-23
-
-
Satyanarayanan, M.1
-
17
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28(3): 583–592.
-
(2012)
Futur Gener Comput Syst
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
20
-
-
84943612463
-
-
Security and privacy issues of fog computing: A survey In: International Conference on Wireless Algorithms, Systems, and Applications, 685–695. Springer
-
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: A survey In: International Conference on Wireless Algorithms, Systems, and Applications, 685–695. Springer.
-
(2015)
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
22
-
-
85007280420
-
-
IEEE, A survey on mobile edge computing In: Intelligent Systems and Control (ISCO), 2016 10th International Conference On, 1–8
-
Ahmed A, Ahmed E (2016) A survey on mobile edge computing In: Intelligent Systems and Control (ISCO), 2016 10th International Conference On, 1–8. IEEE.
-
(2016)
-
-
Ahmed, A.1
Ahmed, E.2
-
26
-
-
85027689874
-
-
IEEE, The unheralded power of cloudlet computing in the vicinity of mobile devices In: Globecom Workshops (GC Wkshps), 2013, 4994–4999. IEEE
-
Li Y, Wang W (2013) The unheralded power of cloudlet computing in the vicinity of mobile devices In: Globecom Workshops (GC Wkshps), 2013 IEEE, 4994–4999. IEEE.
-
(2013)
-
-
Li, Y.1
Wang, W.2
-
29
-
-
85010756872
-
An integrated architecture for software defined and virtualized radio access networks with fog computing
-
Liang K, Zhao L, Chu X, Chen H-H (2017) An integrated architecture for software defined and virtualized radio access networks with fog computing. IEEE Netw 31(1): 80–87.
-
(2017)
IEEE Netw
, vol.31
, Issue.1
, pp. 80-87
-
-
Liang, K.1
Zhao, L.2
Chu, X.3
Chen, H.-H.4
-
30
-
-
84861636756
-
-
IEEE, How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users In: Pervasive Computing and Communications (PerCom), 2012, International Conference On, 122–127. IEEE
-
Clinch S, Harkes J, Friday A, Davies N, Satyanarayanan M (2012) How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users In: Pervasive Computing and Communications (PerCom), 2012 IEEE International Conference On, 122–127. IEEE.
-
(2012)
-
-
Clinch, S.1
Harkes, J.2
Friday, A.3
Davies, N.4
Satyanarayanan, M.5
-
31
-
-
79960589881
-
-
Efficient task scheduling algorithms for cloud computing environment In: High Performance Architecture and Grid Computing, 79–83. Springer
-
Sindhu S, Mukherjee S (2011) Efficient task scheduling algorithms for cloud computing environment In: High Performance Architecture and Grid Computing, 79–83. Springer.
-
(2011)
-
-
Sindhu, S.1
Mukherjee, S.2
-
32
-
-
70350136710
-
The case for vm-based cloudlets in mobile computing
-
Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for vm-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4): 14–23.
-
(2009)
IEEE Pervasive Comput
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
35
-
-
84964252966
-
-
IEEE, A new prime and probe cache side-channel attack for cloud computing In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015, International Conference On, 1718–1724. IEEE
-
Younis YA, Kifayat K, Shi Q, Askwith B (2015) A new prime and probe cache side-channel attack for cloud computing In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference On, 1718–1724. IEEE.
-
(2015)
-
-
Younis, Y.A.1
Kifayat, K.2
Shi, Q.3
Askwith, B.4
-
36
-
-
85011304044
-
Cloud computing security models, architectures, issues and challenges: A survey
-
Shahid MA, Sharif M (2015) Cloud computing security models, architectures, issues and challenges: A survey. Smart Comput Rev 5: 602–616.
-
(2015)
Smart Comput Rev
, vol.5
, pp. 602-616
-
-
Shahid, M.A.1
Sharif, M.2
-
37
-
-
84880905874
-
-
IEEE, Improving web sites performance using edge servers in fog computing architecture In: Service Oriented System Engineering (SOSE), 2013, 7th International Symposium On, 320–323. IEEE
-
Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F (2013) Improving web sites performance using edge servers in fog computing architecture In: Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium On, 320–323. IEEE.
-
(2013)
-
-
Zhu, J.1
Chan, D.S.2
Prabhu, M.S.3
Natarajan, P.4
Hu, H.5
Bonomi, F.6
-
38
-
-
85119542031
-
-
IEEE, Fog computing-network based cloud computing In: Electronics and Communication Systems (ICECS), 2015 2nd International Conference On, 250–251
-
Krishnan YN, Bhagwat CN, Utpat AP (2015) Fog computing-network based cloud computing In: Electronics and Communication Systems (ICECS), 2015 2nd International Conference On, 250–251. IEEE.
-
(2015)
-
-
Krishnan, Y.N.1
Bhagwat, C.N.2
Utpat, A.P.3
-
39
-
-
84914817681
-
-
Ubiquitous shift with information centric network caching using fog computing In: Computational Intelligence in Information Systems, 327–335. Springer
-
Abdullahi I, Arif S, Hassan S (2015) Ubiquitous shift with information centric network caching using fog computing In: Computational Intelligence in Information Systems, 327–335. Springer.
-
(2015)
-
-
Abdullahi, I.1
Arif, S.2
Hassan, S.3
-
40
-
-
84940980355
-
Steiner tree based optimal resource caching scheme in fog computing
-
Su J, Lin F, Zhou X, Lu X (2015) Steiner tree based optimal resource caching scheme in fog computing. China Commun 12(8): 161–168.
-
(2015)
China Commun
, vol.12
, Issue.8
, pp. 161-168
-
-
Su, J.1
Lin, F.2
Zhou, X.3
Lu, X.4
-
41
-
-
33847359539
-
Analysis of caching and replication strategies for web applications
-
Sivasubramanian S, Pierre G, Van Steen M, Alonso G (2007) Analysis of caching and replication strategies for web applications. IEEE Internet Comput 11(1): 60–66.
-
(2007)
IEEE Internet Comput
, vol.11
, Issue.1
, pp. 60-66
-
-
Sivasubramanian, S.1
Pierre, G.2
Van Steen, M.3
Alonso, G.4
-
42
-
-
85027677342
-
-
IEEE,IEEE
-
Halfond WG, Viegas J, Orso A (2006) A classification of sql-injection attacks and countermeasures In: Proceedings of the IEEE International Symposium on Secure Software Engineering, vol. 1, 13–15. IEEE.
-
(2006)
A classification of sql-injection attacks and countermeasures In: Proceedings of the, International Symposium on Secure Software Engineering
, vol.1
-
-
Halfond, W.G.1
Viegas, J.2
Orso, A.3
-
43
-
-
76549111997
-
-
Mitigating drive-by download attacks: Challenges and open problems In: iNetSec 2009–Open Research Problems in Network Security, 52–62. Springer
-
Egele M, Kirda E, Kruegel C (2009) Mitigating drive-by download attacks: Challenges and open problems In: iNetSec 2009–Open Research Problems in Network Security, 52–62. Springer.
-
(2009)
-
-
Egele, M.1
Kirda, E.2
Kruegel, C.3
-
44
-
-
85017956183
-
-
Fog computing and its applications in 5g In: 5G Mobile Communications, 571–593. Springer
-
Gao L, Luan TH, Liu B, Zhou W, Yu S (2017) Fog computing and its applications in 5g In: 5G Mobile Communications, 571–593. Springer.
-
(2017)
-
-
Gao, L.1
Luan, T.H.2
Liu, B.3
Zhou, W.4
Yu, S.5
-
46
-
-
85119305445
-
-
IEEE, The fog balancing: Load distribution for small cell cloud computing In: 2015, 81st Vehicular Technology Conference (VTC Spring), 1–6. IEEE
-
Oueis J, Strinati EC, Barbarossa S (2015) The fog balancing: Load distribution for small cell cloud computing In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 1–6. IEEE.
-
(2015)
-
-
Oueis, J.1
Strinati, E.C.2
Barbarossa, S.3
-
47
-
-
85009802739
-
Mobile edge computing-a key technology towards 5g
-
Hu YC, Patel M, Sabella D, Sprecher N, Young V (2015) Mobile edge computing-a key technology towards 5g. ETSI White Paper 11: 1–16.
-
(2015)
ETSI White Paper
, vol.11
, pp. 1-16
-
-
Hu, Y.C.1
Patel, M.2
Sabella, D.3
Sprecher, N.4
Young, V.5
-
48
-
-
85027696716
-
-
Man-in-the-middle attack In: Encyclopedia of Cryptography and Security, 759–759. Springer
-
Desmedt Y (2011) Man-in-the-middle attack In: Encyclopedia of Cryptography and Security, 759–759. Springer.
-
(2011)
-
-
Desmedt, Y.1
-
49
-
-
77958541036
-
-
IEEE,2010 3rd, International Conference On, IEEE
-
Nayak GN, Samaddar SG (2010) Different flavours of man-in-the-middle attack, consequences and feasible solutions In: Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference On, vol. 5, 491–495. IEEE.
-
(2010)
Different flavours of man-in-the-middle attack, consequences and feasible solutions In: Computer Science and Information Technology (ICCSIT)
, vol.5
-
-
Nayak, G.N.1
Samaddar, S.G.2
-
50
-
-
84994065420
-
-
IEEE, Improved throughput for power line communication (plc) for smart meters using fog computing based data aggregation approach In: Smart Cities Conference (ISC2), 2016, International, 1–4. IEEE
-
Nazmudeen MSH, Wan AT, Buhari SM (2016) Improved throughput for power line communication (plc) for smart meters using fog computing based data aggregation approach In: Smart Cities Conference (ISC2), 2016 IEEE International, 1–4. IEEE.
-
(2016)
-
-
Nazmudeen, M.S.H.1
Wan, A.T.2
Buhari, S.M.3
-
51
-
-
84991383543
-
-
IEEE, A fog computing solution for advanced metering infrastructure In: Transmission and Distribution Conference and Exposition (T&D), 2016, /PES, 1–4. IEEE
-
Yan Y, Su W (2016) A fog computing solution for advanced metering infrastructure In: Transmission and Distribution Conference and Exposition (T&D), 2016 IEEE/PES, 1–4. IEEE.
-
(2016)
-
-
Yan, Y.1
Su, W.2
-
52
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: A comprehensive overview
-
Ozdemir S, Xiao Y (2009) Secure data aggregation in wireless sensor networks: A comprehensive overview. Comput Netw 53(12): 2022–2037.
-
(2009)
Comput Netw
, vol.53
, Issue.12
, pp. 2022-2037
-
-
Ozdemir, S.1
Xiao, Y.2
-
53
-
-
84855849799
-
-
IEEE, Smart meter privacy: A utility-privacy framework In: Smart Grid Communications (SmartGridComm), 2011, International Conference On, 190–195. IEEE
-
Rajagopalan SR, Sankar L, Mohajer S, Poor HV (2011) Smart meter privacy: A utility-privacy framework In: Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference On, 190–195. IEEE.
-
(2011)
-
-
Rajagopalan, S.R.1
Sankar, L.2
Mohajer, S.3
Poor, H.V.4
-
54
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Privacy 7(3): 75–77.
-
(2009)
IEEE Secur Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
55
-
-
84996836535
-
Fog computing architectures for healthcare: Wireless performance and semantic opportunities
-
Prieto González L, Prieto González L, Jaedicke C, Jaedicke C, Schubert J, Schubert J, Stantchev V, Stantchev V (2016) Fog computing architectures for healthcare: Wireless performance and semantic opportunities. J Inf Commun Ethics Soc 14(4): 334–349.
-
(2016)
J Inf Commun Ethics Soc
, vol.14
, Issue.4
, pp. 334-349
-
-
Prieto González, L.1
Prieto González, L.2
Jaedicke, C.3
Jaedicke, C.4
Schubert, J.5
Schubert, J.6
Stantchev, V.7
Stantchev, V.8
-
56
-
-
84986212926
-
Smart items, fog and cloud computing as enablers of servitization in healthcare
-
Stantchev V, Barnawi A, Ghulam S, Schubert J, Tamm G (2015) Smart items, fog and cloud computing as enablers of servitization in healthcare. Sensors Transducers 185(2): 121.
-
(2015)
Sensors Transducers
, vol.185
, Issue.2
, pp. 121
-
-
Stantchev, V.1
Barnawi, A.2
Ghulam, S.3
Schubert, J.4
Tamm, G.5
-
57
-
-
84954148130
-
-
IEEE, The fog computing service for healthcare In: Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015 2nd International Symposium On, 1–5
-
Shi Y, Ding G, Wang H, Roman HE, Lu S (2015) The fog computing service for healthcare In: Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015 2nd International Symposium On, 1–5. IEEE.
-
(2015)
-
-
Shi, Y.1
Ding, G.2
Wang, H.3
Roman, H.E.4
Lu, S.5
-
58
-
-
84964284114
-
-
IEEE, Fog computing in healthcare internet of things: A case study on ecg feature extraction In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015, International Conference On, 356–363. IEEE
-
Gia TN, Jiang M, Rahmani AM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet of things: A case study on ecg feature extraction In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference On, 356–363. IEEE.
-
(2015)
-
-
Gia, T.N.1
Jiang, M.2
Rahmani, A.M.3
Westerlund, T.4
Liljeberg, P.5
Tenhunen, H.6
-
59
-
-
85130943507
-
-
ACM. Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing In: Proceedings of the 2015 Workshop on Mobile Big Data, 43–48
-
Cao Y, Hou P, Brown D, Wang J, Chen S (2015) Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing In: Proceedings of the 2015 Workshop on Mobile Big Data, 43–48. ACM.
-
(2015)
-
-
Cao, Y.1
Hou, P.2
Brown, D.3
Wang, J.4
Chen, S.5
-
60
-
-
84960857858
-
-
IEEE, Fast: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation In: Networking, Architecture and Storage (NAS), 2015, International Conference On, 2–11. IEEE
-
Cao Y, Chen S, Hou P, Brown D (2015) Fast: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation In: Networking, Architecture and Storage (NAS), 2015 IEEE International Conference On, 2–11. IEEE.
-
(2015)
-
-
Cao, Y.1
Chen, S.2
Hou, P.3
Brown, D.4
-
61
-
-
84872006849
-
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings In: International Conference on Security and Privacy in Communication Systems, 89–106. Springer
-
Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings In: International Conference on Security and Privacy in Communication Systems, 89–106. Springer.
-
(2010)
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
62
-
-
41449098948
-
Leds: Providing location-aware end-to-end data security in wireless sensor networks
-
Ren K, Lou W, Zhang Y (2008) Leds: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans Mobile Comput 7(5): 585–598.
-
(2008)
IEEE Trans Mobile Comput
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
63
-
-
84987657183
-
-
IEEE, Dynamic urban surveillance video stream processing using fog computing In: Multimedia Big Data (BigMM), 2016, Second International Conference On, 105–112. IEEE
-
Chen N, Chen Y, You Y, Ling H, Liang P, Zimmermann R (2016) Dynamic urban surveillance video stream processing using fog computing In: Multimedia Big Data (BigMM), 2016 IEEE Second International Conference On, 105–112. IEEE.
-
(2016)
-
-
Chen, N.1
Chen, Y.2
You, Y.3
Ling, H.4
Liang, P.5
Zimmermann, R.6
-
64
-
-
84969922595
-
The promise of edge computing
-
Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5): 78–81.
-
(2016)
Computer
, vol.49
, Issue.5
, pp. 78-81
-
-
Shi, W.1
Dustdar, S.2
-
65
-
-
85119306136
-
-
IEEE, A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing In: 2015 International Conference on Information Networking (ICOIN), 324–329
-
Do CT, Tran NH, Pham C, Alam MGR, Son JH, Hong CS (2015) A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing In: 2015 International Conference on Information Networking (ICOIN), 324–329. IEEE.
-
(2015)
-
-
Do, C.T.1
Tran, N.H.2
Pham, C.3
Alam, M.G.R.4
Son, J.H.5
Hong, C.S.6
-
66
-
-
84904061089
-
A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks
-
Varalakshmi L, Sudha GF, Jaikishan G (2014) A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks. Telecommun Syst 56(3): 357–365.
-
(2014)
Telecommun Syst
, vol.56
, Issue.3
, pp. 357-365
-
-
Varalakshmi, L.1
Sudha, G.F.2
Jaikishan, G.3
-
67
-
-
85119546730
-
-
IEEE, Software defined networking-based vehicular adhoc network with fog computing In: 2015 IFIP/, International Symposium on Integrated Network Management (IM), 1202–1207. IEEE
-
Truong NB, Lee GM, Ghamri-Doudane Y (2015) Software defined networking-based vehicular adhoc network with fog computing In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 1202–1207. IEEE.
-
(2015)
-
-
Truong, N.B.1
Lee, G.M.2
Ghamri-Doudane, Y.3
-
68
-
-
84953311242
-
-
IEEE, Fog computing architecture to enable consumer centric internet of things services In: 2015 International Symposium on Consumer Electronics (ISCE), 1–2
-
Datta SK, Bonnet C, Haerri J (2015) Fog computing architecture to enable consumer centric internet of things services In: 2015 International Symposium on Consumer Electronics (ISCE), 1–2. IEEE.
-
(2015)
-
-
Datta, S.K.1
Bonnet, C.2
Haerri, J.3
-
69
-
-
84965033218
-
A fog-based dss model for driving rule violation monitoring framework on the internet of things
-
Roy S, Bose R, Sarddar D (2015) A fog-based dss model for driving rule violation monitoring framework on the internet of things. Int J Adv Sci Technol 82: 23–32.
-
(2015)
Int J Adv Sci Technol
, vol.82
, pp. 23-32
-
-
Roy, S.1
Bose, R.2
Sarddar, D.3
-
70
-
-
84992202684
-
-
IEEE, Mitigating dynamic dos attacks in mobile ad hoc network In: Colossal Data Analysis and Networking (CDAN), Symposium On, 1–7
-
Joshi B, Singh NK (2016) Mitigating dynamic dos attacks in mobile ad hoc network In: Colossal Data Analysis and Networking (CDAN), Symposium On, 1–7. IEEE.
-
(2016)
-
-
Joshi, B.1
Singh, N.K.2
-
71
-
-
85003604013
-
Aodv-authentication mechanism in manet
-
Defta LC, Iacob NM (2016) Aodv-authentication mechanism in manet. Calitatea 17(S3): 59.
-
(2016)
Calitatea
, vol.17
, Issue.S3
, pp. 59
-
-
Defta, L.C.1
Iacob, N.M.2
-
72
-
-
84989942587
-
An intelligent value stream-based approach to collaboration of food traceability cyber physical system by fog computing
-
Chen RY (2017) An intelligent value stream-based approach to collaboration of food traceability cyber physical system by fog computing. Food Control 71: 124–136.
-
(2017)
Food Control
, vol.71
, pp. 124-136
-
-
Chen, R.Y.1
-
73
-
-
84921266021
-
Cyber security for cyber physcial systems: A trust-based approach
-
Saqib A, Anwar RW, Hussain OK, Ahmad M, Ngadi MA, Mohamad MM, Malki Z, Noraini C, Jnr BA, Nor RNH, et al. (2015) Cyber security for cyber physcial systems: A trust-based approach. J Theor Appl Inf Technol 71(2): 144–152.
-
(2015)
J Theor Appl Inf Technol
, vol.71
, Issue.2
, pp. 144-152
-
-
Saqib, A.1
Anwar, R.W.2
Hussain, O.K.3
Ahmad, M.4
Ngadi, M.A.5
Mohamad, M.M.6
Malki, Z.7
Noraini, C.8
Jnr, B.A.9
Nor, R.N.H.10
-
74
-
-
84979619249
-
Fit a fog computing device for speech teletreatments
-
Monteiro A, Dubey H, Mahler L, Yang Q, Mankodiya K (2016) Fit a fog computing device for speech teletreatments. arXiv preprint arXiv:1605.06236.
-
(2016)
Preprint
, pp. 1605.06236
-
-
Monteiro, A.1
Dubey, H.2
Mahler, L.3
Yang, Q.4
Mankodiya, K.5
-
75
-
-
84964689396
-
-
IEEE, Computing at the mobile edge: Designing elastic android applications for computation offloading In: IFIP Wireless and Mobile Networking Conference (WMNC), 2015 8th, 112–119
-
Orsini G, Bade D, Lamersdorf W (2015) Computing at the mobile edge: Designing elastic android applications for computation offloading In: IFIP Wireless and Mobile Networking Conference (WMNC), 2015 8th, 112–119. IEEE.
-
(2015)
-
-
Orsini, G.1
Bade, D.2
Lamersdorf, W.3
-
77
-
-
84869035513
-
-
IEEE, Malicious android applications in the enterprise: What do they do and how do we fix it? In: Data Engineering Workshops (ICDEW), 2012, 28th International Conference On, 251–254. IEEE
-
Wei X, Gomez L, Neamtiu I, Faloutsos M (2012) Malicious android applications in the enterprise: What do they do and how do we fix it? In: Data Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference On, 251–254. IEEE.
-
(2012)
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
78
-
-
84964811586
-
Analysis of malicious behavior of android apps
-
Singh P, Tiwari P, Singh S (2016) Analysis of malicious behavior of android apps. Procedia Comput Sci 79: 215–220.
-
(2016)
Procedia Comput Sci
, vol.79
, pp. 215-220
-
-
Singh, P.1
Tiwari, P.2
Singh, S.3
-
79
-
-
84908631947
-
-
IEEE, Augmented brain computer interaction based on fog computing and linked data In: Intelligent Environments (IE), 2014 International Conference On, 374–377
-
Zao JK, Gan TT, You CK, Méndez SJR, Chung CE, Te Wang Y, Mullen T, Jung TP (2014) Augmented brain computer interaction based on fog computing and linked data In: Intelligent Environments (IE), 2014 International Conference On, 374–377. IEEE.
-
(2014)
-
-
Zao, J.K.1
Gan, T.T.2
You, C.K.3
Méndez, S.J.R.4
Chung, C.E.5
Te Wang, Y.6
Mullen, T.7
Jung, T.P.8
-
80
-
-
84902008544
-
Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology
-
Zao JK, Gan TT, You CK, Chung CE, Wang YT, Méndez SJR, Mullen T, Yu C, Kothe C, Hsiao CT, et al. (2014) Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology. Front Hum Neurosci 8: 370–386.
-
(2014)
Front Hum Neurosci
, vol.8
, pp. 370-386
-
-
Zao, J.K.1
Gan, T.T.2
You, C.K.3
Chung, C.E.4
Wang, Y.T.5
Méndez, S.J.R.6
Mullen, T.7
Yu, C.8
Kothe, C.9
Hsiao, C.T.10
-
81
-
-
84960118857
-
-
ACM. Fog data: enhancing telehealth big data through fog computing In: Proceedings of the ASE BigData & SocialInformatics 2015, 14
-
Dubey H, Yang J, Constant N, Amiri AM, Yang Q, Makodiya K (2015) Fog data: enhancing telehealth big data through fog computing In: Proceedings of the ASE BigData & SocialInformatics 2015, 14. ACM.
-
(2015)
-
-
Dubey, H.1
Yang, J.2
Constant, N.3
Amiri, A.M.4
Yang, Q.5
Makodiya, K.6
-
82
-
-
85007566242
-
-
ACM. Efficient authentication of resource-constrained iot devices based on ecqv implicit certificates and datagram transport layer security protocol In: Proceedings of the Seventh Symposium on Information and Communication Technology, 173–179
-
Ha DA, Nguyen KT, Zao JK (2016) Efficient authentication of resource-constrained iot devices based on ecqv implicit certificates and datagram transport layer security protocol In: Proceedings of the Seventh Symposium on Information and Communication Technology, 173–179. ACM.
-
(2016)
-
-
Ha, D.A.1
Nguyen, K.T.2
Zao, J.K.3
-
83
-
-
85119709459
-
-
IEEE, Fog computing micro datacenter based dynamic resource estimation and pricing model for iot In: 2015, 29th International Conference on Advanced Information Networking and Applications, 687–694. IEEE
-
Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for iot In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 687–694. IEEE.
-
(2015)
-
-
Aazam, M.1
Huh, E.N.2
-
84
-
-
84986211321
-
Fog computing: Helping the internet of things realize its potential
-
Dastjerdi AV, Buyya R (2016) Fog computing: Helping the internet of things realize its potential. Computer 49(8): 112–116.
-
(2016)
Computer
, vol.49
, Issue.8
, pp. 112-116
-
-
Dastjerdi, A.V.1
Buyya, R.2
-
85
-
-
84947798047
-
Fully secure fuzzy identity-based encryption for secure iot communications
-
Mao Y, Li J, Chen MR, Liu J, Xie C, Zhan Y (2016) Fully secure fuzzy identity-based encryption for secure iot communications. Comput Standards Interfaces 44: 117–121.
-
(2016)
Comput Standards Interfaces
, vol.44
, pp. 117-121
-
-
Mao, Y.1
Li, J.2
Chen, M.R.3
Liu, J.4
Xie, C.5
Zhan, Y.6
-
86
-
-
84992227458
-
Proposed nist standard for role-based access control
-
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed nist standard for role-based access control. ACM Trans Inf Syst Security (TISSEC) 4(3): 224–274.
-
(2001)
ACM Trans Inf Syst Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
87
-
-
84976371915
-
Fog computing may help to save energy in cloud computing
-
Jalali F, Hinton K, Ayre R, Alpcan T, Tucker RS (2016) Fog computing may help to save energy in cloud computing. IEEE J Selected Areas Commun 34(5): 1728–1739.
-
(2016)
IEEE J Selected Areas Commun
, vol.34
, Issue.5
, pp. 1728-1739
-
-
Jalali, F.1
Hinton, K.2
Ayre, R.3
Alpcan, T.4
Tucker, R.S.5
-
88
-
-
84953720896
-
-
IEEE, Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing In: 2015, International Conference on Communications (ICC), 3909–3914. IEEE
-
Deng R, Lu R, Lai C, Luan TH (2015) Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing In: 2015 IEEE International Conference on Communications (ICC), 3909–3914. IEEE.
-
(2015)
-
-
Deng, R.1
Lu, R.2
Lai, C.3
Luan, T.H.4
-
90
-
-
84962038954
-
Towards achieving data security with the cloud computing adoption framework
-
Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1): 138–151.
-
(2016)
IEEE Trans Serv Comput
, vol.9
, Issue.1
, pp. 138-151
-
-
Chang, V.1
Ramachandran, M.2
-
92
-
-
84881192292
-
The role of cloudlets in hostile environments
-
Satyanarayanan M, Lewis G, Morris E, Simanta S, Boleng J, Ha K (2013) The role of cloudlets in hostile environments. IEEE Pervasive Comput 12(4): 40–49.
-
(2013)
IEEE Pervasive Comput
, vol.12
, Issue.4
, pp. 40-49
-
-
Satyanarayanan, M.1
Lewis, G.2
Morris, E.3
Simanta, S.4
Boleng, J.5
Ha, K.6
-
93
-
-
84912553395
-
-
IEEE, Tactical cloudlets: Moving cloud computing to the edge In: Military Communications Conference (MILCOM), 2014, 1440–1446. IEEE
-
Lewis G, Echeverría S, Simanta S, Bradshaw B, Root J (2014) Tactical cloudlets: Moving cloud computing to the edge In: Military Communications Conference (MILCOM), 2014 IEEE, 1440–1446. IEEE.
-
(2014)
-
-
Lewis, G.1
Echeverría, S.2
Simanta, S.3
Bradshaw, B.4
Root, J.5
-
94
-
-
85027709371
-
Performance analysis of wireless network throughput and security protocol integration
-
Ochang PA, Irving P (2016) Performance analysis of wireless network throughput and security protocol integration. Int J Future Generation Commun Netw 9(1): 71–78.
-
(2016)
Int J Future Generation Commun Netw
, vol.9
, Issue.1
, pp. 71-78
-
-
Ochang, P.A.1
Irving, P.2
-
95
-
-
84949922231
-
-
IEEE, Preserving privacy in sensor-fog networks In: Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference For, 96–99
-
Kulkarni S, Saha S, Hockenbury R (2014) Preserving privacy in sensor-fog networks In: Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference For, 96–99. IEEE.
-
(2014)
-
-
Kulkarni, S.1
Saha, S.2
Hockenbury, R.3
-
96
-
-
84864275237
-
-
IEEE, Fog computing: Mitigating insider data theft attacks in the cloud In: Security and Privacy Workshops (SPW), 2012, Symposium On, 125–128. IEEE
-
Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: Mitigating insider data theft attacks in the cloud In: Security and Privacy Workshops (SPW), 2012 IEEE Symposium On, 125–128. IEEE.
-
(2012)
-
-
Stolfo, S.J.1
Salem, M.B.2
Keromytis, A.D.3
-
97
-
-
84859368129
-
Replicates and repeats-what is the difference and is it significant?
-
Vaux DL, Fidler F, Cumming G (2012) Replicates and repeats-what is the difference and is it significant?EMBO Reports 13(4): 291–296.
-
(2012)
EMBO Reports
, vol.13
, Issue.4
, pp. 291-296
-
-
Vaux, D.L.1
Fidler, F.2
Cumming, G.3
-
99
-
-
85027684949
-
Fog computing: Comprehensive approach for security data theft attack using elliptic curve cryptography and decoy technology
-
Dong MT, Zhou X (2016) Fog computing: Comprehensive approach for security data theft attack using elliptic curve cryptography and decoy technology. Open Access Library J 3(09): 1.
-
(2016)
Open Access Library J
, vol.3
, Issue.9
, pp. 1
-
-
Dong, M.T.1
Zhou, X.2
-
100
-
-
84941286216
-
-
IEEE, Policy-driven security management for fog computing: Preliminary framework and a case study In: Information Reuse and Integration (IRI), 2014, 15th International Conference On, 16–23. IEEE
-
Dsouza C, Ahn GJ, Taguinod M (2014) Policy-driven security management for fog computing: Preliminary framework and a case study In: Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference On, 16–23. IEEE.
-
(2014)
-
-
Dsouza, C.1
Ahn, G.J.2
Taguinod, M.3
-
101
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
Mirkovic J, Reiher P (2004) A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2): 39–53.
-
(2004)
ACM SIGCOMM Comput Commun Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
102
-
-
84908583823
-
-
IEEE, Towards mitigation of low and slow application ddos attacks In: Cloud Engineering (IC2E), 2014, International Conference On, 604–609. IEEE
-
Shtern M, Sandel R, Litoiu M, Bachalo C, Theodorou V (2014) Towards mitigation of low and slow application ddos attacks In: Cloud Engineering (IC2E), 2014 IEEE International Conference On, 604–609. IEEE.
-
(2014)
-
-
Shtern, M.1
Sandel, R.2
Litoiu, M.3
Bachalo, C.4
Theodorou, V.5
-
104
-
-
85019545969
-
-
Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling In: International Conference on Cryptology in Africa, 184–201. Springer
-
Bos JW, Castryck W, Iliashenko I, Vercauteren F (2017) Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling In: International Conference on Cryptology in Africa, 184–201. Springer.
-
(2017)
-
-
Bos, J.W.1
Castryck, W.2
Iliashenko, I.3
Vercauteren, F.4
-
105
-
-
84864583229
-
Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
Lu R, Liang X, Li X, Lin X, Shen X (2012) Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distributed Syst 23(9): 1621–1631.
-
(2012)
IEEE Trans Parallel Distributed Syst
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
107
-
-
84939500265
-
A study of encryption algorithms aes, des and rsa for security
-
Mahajan P, Sachdeva A (2013) A study of encryption algorithms aes, des and rsa for security. Global J Comput Sci Technol 13(15): 15–22.
-
(2013)
Global J Comput Sci Technol
, vol.13
, Issue.15
, pp. 15-22
-
-
Mahajan, P.1
Sachdeva, A.2
-
108
-
-
73349112862
-
Database encryption: an overview of contemporary challenges and design considerations
-
Shmueli E, Vaisenberg R, Elovici Y, Glezer C (2010) Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Record 38(3): 29–34.
-
(2010)
ACM SIGMOD Record
, vol.38
, Issue.3
, pp. 29-34
-
-
Shmueli, E.1
Vaisenberg, R.2
Elovici, Y.3
Glezer, C.4
-
109
-
-
85027726431
-
SEcube (TM): Data at rest and data in motion protection
-
The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Athens
-
Varriale A, Prinetto P, Carelli A, Trotta P (2016) SEcube (TM): Data at rest and data in motion protection In: Proceedings of the International Conference on Security and Management (SAM), 138–144. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Athens.
-
(2016)
Proceedings of the International Conference on Security and Management (SAM)
, pp. 138-144
-
-
Varriale, A.1
Prinetto, P.2
Carelli, A.3
Trotta, P.4
-
111
-
-
70350389843
-
-
Enabling public verifiability and data dynamics for storage security in cloud computing In: European Symposium on Research in Computer Security, 355–370. Springer
-
Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing In: European Symposium on Research in Computer Security, 355–370. Springer.
-
(2009)
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
112
-
-
1942441379
-
Defending against cache-based side-channel attacks
-
Page D (2003) Defending against cache-based side-channel attacks. Inf Security Technical Rep 8(1): 30–44.
-
(2003)
Inf Security Technical Rep
, vol.8
, Issue.1
, pp. 30-44
-
-
Page, D.1
-
113
-
-
79960321311
-
Trace-driven cache attacks on aes (short paper) In: International Conference on Information and Communications Security, 112–121
-
Koç K
-
Acıiçmez O, Koç Ç,K (2006) Trace-driven cache attacks on aes (short paper) In: International Conference on Information and Communications Security, 112–121. Springer.
-
(2006)
Springer
-
-
Acıiçmez, O.1
-
114
-
-
85027713338
-
-
ACM. Security testing of a secure cache design In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 3
-
Liu F, Lee RB (2013) Security testing of a secure cache design In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 3. ACM.
-
(2013)
-
-
Liu, F.1
Lee, R.B.2
-
115
-
-
85073538603
-
-
Usenix, STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud In: USENIX Security Symposium, 189–204
-
Kim T, Peinado M, Mainar-Ruiz G (2012) STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud In: USENIX Security Symposium, 189–204. Usenix.
-
(2012)
-
-
Kim, T.1
Peinado, M.2
Mainar-Ruiz, G.3
-
116
-
-
70349236164
-
-
ACM. Deconstructing new cache designs for thwarting software cache-based side channel attacks In: Proceedings of the 2nd ACM Workshop on Computer Security Architectures, 25–34
-
Kong J, Aciicmez O, Seifert JP, Zhou H (2008) Deconstructing new cache designs for thwarting software cache-based side channel attacks In: Proceedings of the 2nd ACM Workshop on Computer Security Architectures, 25–34. ACM.
-
(2008)
-
-
Kong, J.1
Aciicmez, O.2
Seifert, J.P.3
Zhou, H.4
-
117
-
-
84913593468
-
A survey on software-defined network and openflow: From concept to implementation
-
Hu F, Hao Q, Bao K (2014) A survey on software-defined network and openflow: From concept to implementation. IEEE Commun Surv Tutorials 16(4): 2181–2206.
-
(2014)
IEEE Commun Surv Tutorials
, vol.16
, Issue.4
, pp. 2181-2206
-
-
Hu, F.1
Hao, Q.2
Bao, K.3
-
118
-
-
84874562245
-
-
IEEE, Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) In: Network Protocols (ICNP), 2012 20th, International Conference On, 1–6. IEEE
-
Shin S, Gu G (2012) Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) In: Network Protocols (ICNP), 2012 20th IEEE International Conference On, 1–6. IEEE.
-
(2012)
-
-
Shin, S.1
Gu, G.2
-
119
-
-
84904166671
-
-
IEEE, Payless: A low cost network monitoring framework for software defined networks In: Network Operations and Management Symposium (NOMS), 2014, 1–9. IEEE
-
Chowdhury SR, Bari MF, Ahmed R, Boutaba R (2014) Payless: A low cost network monitoring framework for software defined networks In: Network Operations and Management Symposium (NOMS), 2014 IEEE, 1–9. IEEE.
-
(2014)
-
-
Chowdhury, S.R.1
Bari, M.F.2
Ahmed, R.3
Boutaba, R.4
-
120
-
-
84878341131
-
Cloud monitoring: A survey
-
Aceto G, Botta A, De Donato W, Pescapè A (2013) Cloud monitoring: A survey. Comput Netw 57(9): 2093–2115.
-
(2013)
Comput Netw
, vol.57
, Issue.9
, pp. 2093-2115
-
-
Aceto, G.1
Botta, A.2
De Donato, W.3
Pescapè, A.4
-
121
-
-
84916918767
-
A survey of information security incident handling in the cloud
-
Ab Rahman NH, Choo K-KR (2015) A survey of information security incident handling in the cloud. Comput Secur 49: 45–69.
-
(2015)
Comput Secur
, vol.49
, pp. 45-69
-
-
Ab Rahman, N.H.1
Choo, K.-K.R.2
-
122
-
-
84904994660
-
Monitoring and analyzing big traffic data of a large-scale cellular network with hadoop
-
Liu J, Liu F, Ansari N (2014) Monitoring and analyzing big traffic data of a large-scale cellular network with hadoop. IEEE Netw 28(4): 32–39.
-
(2014)
IEEE Netw
, vol.28
, Issue.4
, pp. 32-39
-
-
Liu, J.1
Liu, F.2
Ansari, N.3
-
123
-
-
85027713712
-
Intelligent firewall using intrusion detection system based on neural networks
-
Sawant MD, Phatak MM, Ranavde MA, Laxamanan NR (2015) Intelligent firewall using intrusion detection system based on neural networks. J Netw Inf Security 2(2): 14–17.
-
(2015)
J Netw Inf Security
, vol.2
, Issue.2
, pp. 14-17
-
-
Sawant, M.D.1
Phatak, M.M.2
Ranavde, M.A.3
Laxamanan, N.R.4
-
125
-
-
85020871884
-
A survey on various malware detection techniques on mobile platform
-
Malhotra A, Bajaj K (2016) A survey on various malware detection techniques on mobile platform. Int J Comput Appl 139(5): 15–20.
-
(2016)
Int J Comput Appl
, vol.139
, Issue.5
, pp. 15-20
-
-
Malhotra, A.1
Bajaj, K.2
-
126
-
-
84881191238
-
-
ACM
-
Demme J, Maycock M, Schmitz J, Tang A, Waksman A, Sethumadhavan S, Stolfo S (2013) On the feasibility of online malware detection with performance counters In: ACM SIGARCH Computer Architecture News, vol. 41, 559–570. ACM.
-
(2013)
On the feasibility of online malware detection with performance counters In: ACM SIGARCH Computer Architecture News
, vol.41
-
-
Demme, J.1
Maycock, M.2
Schmitz, J.3
Tang, A.4
Waksman, A.5
Sethumadhavan, S.6
Stolfo, S.7
-
127
-
-
85076301604
-
Barecloud: Bare-metal analysis-based evasive malware detection
-
Usenix, University of California, Santa Barbara
-
Kirat D, Vigna G, Kruegel C (2014) Barecloud: Bare-metal analysis-based evasive malware detection In: USENIX Security, 287–301. Usenix, University of California, Santa Barbara.
-
(2014)
USENIX Security
, pp. 287-301
-
-
Kirat, D.1
Vigna, G.2
Kruegel, C.3
-
128
-
-
84883108795
-
-
IEEE, Combining supervised and unsupervised learning for zero-day malware detection In: INFOCOM, 2013 Proceedings, 2022–2030. IEEE
-
Comar PM, Liu L, Saha S, Tan PN, Nucci A (2013) Combining supervised and unsupervised learning for zero-day malware detection In: INFOCOM, 2013 Proceedings IEEE, 2022–2030. IEEE.
-
(2013)
-
-
Comar, P.M.1
Liu, L.2
Saha, S.3
Tan, P.N.4
Nucci, A.5
-
130
-
-
84906830290
-
-
IEEE, Detection of zero-day malware based on the analysis of opcode sequences In: Consumer Communications and Networking Conference (CCNC), 2014, 11th, 386–391. IEEE
-
Zolotukhin M, Hamalainen T (2014) Detection of zero-day malware based on the analysis of opcode sequences In: Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th, 386–391. IEEE.
-
(2014)
-
-
Zolotukhin, M.1
Hamalainen, T.2
-
131
-
-
84888412363
-
Smm rootkit: a new breed of os independent malware
-
Embleton S, Sparks S, Zou CC (2013) Smm rootkit: a new breed of os independent malware. Secur Commun Netw 6(12): 1590–1605.
-
(2013)
Secur Commun Netw
, vol.6
, Issue.12
, pp. 1590-1605
-
-
Embleton, S.1
Sparks, S.2
Zou, C.C.3
-
132
-
-
84922575268
-
-
IEEE, Fog computing and smart gateway based communication for cloud of things In: Future Internet of Things and Cloud (FiCloud), 2014 International Conference On, 464–470
-
Aazam M, Huh EN (2014) Fog computing and smart gateway based communication for cloud of things In: Future Internet of Things and Cloud (FiCloud), 2014 International Conference On, 464–470. IEEE.
-
(2014)
-
-
Aazam, M.1
Huh, E.N.2
-
133
-
-
84860253312
-
Security and privacy issues in wireless sensor networks for healthcare applications
-
Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1): 93–101.
-
(2012)
J Med Syst
, vol.36
, Issue.1
, pp. 93-101
-
-
Al Ameen, M.1
Liu, J.2
Kwak, K.3
-
134
-
-
85027681321
-
Security in wireless sensor networks: issues and challenges In: Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol. 2, 6
-
Pathan A-SK, Lee HW, Hong CS (2006) Security in wireless sensor networks: issues and challenges In: Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol. 2, 6. IEEE.
-
(2006)
IEEE
-
-
Pathan, A.-S.K.1
Lee, H.W.2
Hong, C.S.3
-
135
-
-
84923009701
-
Intrusion detection techniques for mobile cloud computing in heterogeneous 5g
-
Gai K, Qiu M, Tao L, Zhu Y (2015) Intrusion detection techniques for mobile cloud computing in heterogeneous 5g. Secur Commun Netw 10: 3049–3058.
-
(2015)
Secur Commun Netw
, vol.10
, pp. 3049-3058
-
-
Gai, K.1
Qiu, M.2
Tao, L.3
Zhu, Y.4
-
136
-
-
84955710198
-
Survey on security issues in vehicular ad hoc networks
-
Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc networks. Alexandria Eng J 54(4): 1115–1126.
-
(2015)
Alexandria Eng J
, vol.54
, Issue.4
, pp. 1115-1126
-
-
Mokhtar, B.1
Azab, M.2
-
137
-
-
85027680959
-
-
Security and privacy in vehicular ad-hoc networks: survey and the road ahead In: Wireless Networks and Security, 107–132. Springer
-
Razzaque M, Salehi A, Cheraghi SM (2013) Security and privacy in vehicular ad-hoc networks: survey and the road ahead In: Wireless Networks and Security, 107–132. Springer.
-
(2013)
-
-
Razzaque, M.1
Salehi, A.2
Cheraghi, S.M.3
-
138
-
-
84923030214
-
Trust on the security of wireless vehicular ad-hoc networking
-
Rawat DB, Yan G, Bista BB, Weigle MC (2015) Trust on the security of wireless vehicular ad-hoc networking. Ad Hoc Sensor Wireless Netw 24(3-4): 283–305.
-
(2015)
Ad Hoc Sensor Wireless Netw
, vol.24
, Issue.3-4
, pp. 283-305
-
-
Rawat, D.B.1
Yan, G.2
Bista, B.B.3
Weigle, M.C.4
-
139
-
-
84989947101
-
-
IEEE, A stateless time-based authenticated-message protocol for wireless sensor networks (stamp) In: Wireless Communications and Networking Conference (WCNC), 2016, 1–6. IEEE
-
Boumerdassi S, Renault É, Muhlethaler P (2016) A stateless time-based authenticated-message protocol for wireless sensor networks (stamp) In: Wireless Communications and Networking Conference (WCNC), 2016 IEEE, 1–6. IEEE.
-
(2016)
-
-
Boumerdassi, S.1
Renault, É.2
Muhlethaler, P.3
-
140
-
-
78649986128
-
-
ACM. Multi-tenant saas applications: maintenance dream or nightmare? In: Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), 88–92
-
Bezemer CP, Zaidman A (2010) Multi-tenant saas applications: maintenance dream or nightmare? In: Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), 88–92. ACM.
-
(2010)
-
-
Bezemer, C.P.1
Zaidman, A.2
-
141
-
-
84903642496
-
-
IEEE, Multi-tenancy in cloud computing In: Service Oriented System Engineering (SOSE), 2014, 8th International Symposium On, 344–351. IEEE
-
AlJahdali H, Albatli A, Garraghan P, Townend P, Lau L, Xu J (2014) Multi-tenancy in cloud computing In: Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium On, 344–351. IEEE.
-
(2014)
-
-
AlJahdali, H.1
Albatli, A.2
Garraghan, P.3
Townend, P.4
Lau, L.5
Xu, J.6
-
142
-
-
84897106892
-
Security issues in cloud environments: a survey
-
Fernandes DA, Soares LF, Gomes JV, Freire MM, Inácio PR (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2): 113–170.
-
(2014)
Int J Inf Secur
, vol.13
, Issue.2
, pp. 113-170
-
-
Fernandes, D.A.1
Soares, L.F.2
Gomes, J.V.3
Freire, M.M.4
Inácio, P.R.5
-
143
-
-
84957679321
-
-
IEEE, Serene: on establishing secure and resilient networking services for an sdn-based multi-tenant datacenter environment In: Dependable Systems and Networks Workshops (DSN-W), 2015, International Conference On, 4–11. IEEE
-
Chung CJ, Xing T, Huang D, Medhi D, Trivedi K (2015) Serene: on establishing secure and resilient networking services for an sdn-based multi-tenant datacenter environment In: Dependable Systems and Networks Workshops (DSN-W), 2015 IEEE International Conference On, 4–11. IEEE.
-
(2015)
-
-
Chung, C.J.1
Xing, T.2
Huang, D.3
Medhi, D.4
Trivedi, K.5
-
144
-
-
85051334317
-
Disaster recovery as a cloud service: Economic benefits & deployment challenges
-
Wood T, Cecchet E, Ramakrishnan KK, Shenoy PJ, van der Merwe JE, Venkataramani A (2010) Disaster recovery as a cloud service: Economic benefits & deployment challenges. HotCloud 10: 8–15.
-
(2010)
HotCloud
, vol.10
, pp. 8-15
-
-
Wood, T.1
Cecchet, E.2
Ramakrishnan, K.K.3
Shenoy, P.J.4
van der Merwe, J.E.5
Venkataramani, A.6
-
146
-
-
84925307605
-
-
IEEE, Overview of data backup and disaster recovery in cloud In: Information Communication and Embedded Systems (ICICES), 2014 International Conference On, 1–7
-
Suguna S, Suhasini A (2014) Overview of data backup and disaster recovery in cloud In: Information Communication and Embedded Systems (ICICES), 2014 International Conference On, 1–7. IEEE.
-
(2014)
-
-
Suguna, S.1
Suhasini, A.2
-
147
-
-
85021242747
-
-
IEEE, Ssd-assisted backup and recovery for database systems In: Data Engineering (ICDE), 2017, 33rd International Conference On, 285–296. IEEE
-
Son Y, Choi J, Jeon J, Min C, Kim S, Yeom HY, Han H (2017) Ssd-assisted backup and recovery for database systems In: Data Engineering (ICDE), 2017 IEEE 33rd International Conference On, 285–296. IEEE.
-
(2017)
-
-
Son, Y.1
Choi, J.2
Jeon, J.3
Min, C.4
Kim, S.5
Yeom, H.Y.6
Han, H.7
-
148
-
-
84949680616
-
Vmbackup: an efficient framework for online virtual machine image backup and recovery
-
Zeng L, Xu S, Wang Y (2016) Vmbackup: an efficient framework for online virtual machine image backup and recovery. Concurrency Comput Pract Experience 28(9): 2630–2643.
-
(2016)
Concurrency Comput Pract Experience
, vol.28
, Issue.9
, pp. 2630-2643
-
-
Zeng, L.1
Xu, S.2
Wang, Y.3
-
149
-
-
85009458357
-
Distinguishing between expert and statistical systems for application under ICH M7
-
Barber C, Hanser T, Judson P, Williams R (2017) Distinguishing between expert and statistical systems for application under ICH M7. Regulatory Toxicol Pharmacol 84: 124–130.
-
(2017)
Regulatory Toxicol Pharmacol
, vol.84
, pp. 124-130
-
-
Barber, C.1
Hanser, T.2
Judson, P.3
Williams, R.4
|