-
1
-
-
85032365695
-
-
Data Center Companies. Accessed: Jul. 23
-
Data Center Companies. Accessed: Jul. 23, 2017. [Online]. Available: https://www.datacenters.com/directory/companies
-
(2017)
-
-
-
2
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
Helsinki, Finland, Feb
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things," in Proc. 1st Ed. MCC Workshop Mobile Cloud Comput. (MCC), Helsinki, Finland, Feb. 2012, pp. 13-16.
-
(2012)
Proc. 1st Ed. MCC Workshop Mobile Cloud Comput. (MCC)
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
4
-
-
84971658593
-
Fog computing: The cloud-IoT/IoE middle-ware paradigm
-
May
-
M. Aazam and E. N. Huh, "Fog computing: The cloud-IoT/IoE middle-ware paradigm," IEEE Potentials, vol. 35, no. 3, pp. 40-44, May 2016.
-
(2016)
IEEE Potentials
, vol.35
, Issue.3
, pp. 40-44
-
-
Aazam, M.1
Huh, E.N.2
-
5
-
-
85019269553
-
-
Accessed: Jul. 23, 2017
-
OpenFog Consortium. Accessed: Jul. 23, 2017. [Online]. Available: https://www.openfogconsortium.org
-
OpenFog Consortium
-
-
-
6
-
-
85032394569
-
-
OpenFog Reference Architecture. Accessed: Jul. 23, 2017
-
OpenFog Reference Architecture. Accessed: Jul. 23, 2017. [Online]. Avail-able: https://www.openfogconsortium.org/ra/
-
-
-
-
7
-
-
85032394640
-
-
Accessed: Feb. 20, 2017
-
Akami Cloudlet Overview. Accessed: Feb. 20, 2017. [Online]. Available: https://www.akamai.com/us/en/products/web-performance/cloudlets/
-
Akami Cloudlet Overview
-
-
-
8
-
-
85032364238
-
-
Accessed: Feb. 20, 2017
-
Intelligent Edge Intel. Accessed: Feb. 20, 2017. [Online]. Available: https://itpeernetwork.intel.com/extending-intelligence-to-the-edge/
-
Intelligent Edge Intel
-
-
-
9
-
-
85010031130
-
Fog and IoT: An overview of research opportu-nities
-
Dec.
-
M. Chiang and T. Zhang, "Fog and IoT: An overview of research opportu-nities," IEEE Internet Things J., vol. 3, no. 6, pp. 1-11, Dec. 2016.
-
(2016)
IEEE Internet Things J.
, vol.3
, Issue.6
, pp. 1-11
-
-
Chiang, M.1
Zhang, T.2
-
10
-
-
85006216192
-
Front-end intelligence for large-scale application-oriented Internet-of-Things
-
Jun
-
A. Bader, H. Ghazzai, A. Kadri, and M.-S. Alouini, "Front-end intelligence for large-scale application-oriented Internet-of-Things," IEEE Access, vol. 4, pp. 3257-3272, Jun. 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 3257-3272
-
-
Bader, A.1
Ghazzai, H.2
Kadri, A.3
Alouini, M.-S.4
-
11
-
-
85011060262
-
Challenges and opportunities in edge computing
-
Nov
-
B. Varghese, N.Wang, S. Barbhuiya, P. Kilpatrick, and D. S. Nikolopoulos, "Challenges and opportunities in edge computing," in Proc. IEEE Int. Conf. Smart Cloud (SmartCloud), Nov. 2016, pp. 20-26.
-
(2016)
Proc. IEEE Int. Conf. Smart Cloud (SmartCloud)
, pp. 20-26
-
-
Varghese, B.1
Wang, N.2
Barbhuiya, S.3
Kilpatrick, P.4
Nikolopoulos, D.S.5
-
12
-
-
84987842183
-
Edge computing: Vision and challenges
-
Oct.
-
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges," IEEE Internet Things J., vol. 3, no. 5, pp. 637-646, Oct. 2016.
-
(2016)
IEEE Internet Things J
, vol.3
, Issue.5
, pp. 637-646
-
-
Shi, W.1
Cao, J.2
Zhang, Q.3
Li, Y.4
Xu, L.5
-
14
-
-
84966662927
-
Assessment of the suitability of fog computing in the context of Internet of things
-
to be published
-
S. Sarkar, S. Chatterjee, and S. Misra, "Assessment of the suitability of fog computing in the context of Internet of things," IEEE Trans. Cloud Comput., to be published.
-
IEEE Trans. Cloud Comput
-
-
Sarkar, S.1
Chatterjee, S.2
Misra, S.3
-
15
-
-
84951050684
-
A survey of fog computing: Concepts, applications and issues
-
Jun
-
S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues," in Proc. Workshop Mobile Big Data (Mobidata), Jun. 2015, pp. 37-42.
-
(2015)
Proc. Workshop Mobile Big Data (Mobidata)
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.3
-
16
-
-
84943612463
-
Security and privacy issues of fog computing: A survey
-
Aug
-
S. Yi, Z. Qin, and Q. Li, "Security and privacy issues of fog computing: A survey," in Proc. 10th Int. Conf. Wireless Algorithms, Syst., Appl. (WASA), Aug. 2015, pp. 685-695.
-
(2015)
Proc. 10th Int. Conf. Wireless Algorithms, Syst., Appl. (WASA)
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
18
-
-
84923117513
-
Fog computing: A cloud to the ground support for smart things and machine-to-machine networks
-
Nov
-
I. Stojmenovic, "Fog computing: A cloud to the ground support for smart things and machine-to-machine networks," in Proc. Austral. Telecommun. Netw. Appl. Conf. (ATNAC), Nov. 2014, pp. 117-122.
-
(2014)
Proc. Austral. Telecommun. Netw. Appl. Conf. (ATNAC)
, pp. 117-122
-
-
Stojmenovic, I.1
-
19
-
-
85018284804
-
Fog computing: Common security issues and proposed countermeasures
-
Nov
-
P. Kumar, N. Zaidi, and T. Choudhury, "Fog computing: Common security issues and proposed countermeasures," in Proc. Int. Conf. System Model-ing Adv. Res. Trends (SMART), Nov. 2016, pp. 311-315.
-
(2016)
Proc. Int. Conf. System Model-ing Adv. Res. Trends (SMART)
, pp. 311-315
-
-
Kumar, P.1
Zaidi, N.2
Choudhury, T.3
-
20
-
-
85015190263
-
Fog computing for the Internet of Things: Security and privacy issues
-
Mar
-
A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog computing for the Internet of Things: Security and privacy issues," IEEE Internet Comput., vol. 21, no. 2, pp. 34-42, Mar. 2017.
-
(2017)
IEEE Internet Comput.
, vol.21
, Issue.2
, pp. 34-42
-
-
Alrawais, A.1
Alhothaily, A.2
Hu, C.3
Cheng, X.4
-
21
-
-
85028437162
-
Security, privacy, and fairness in fog-based vehicular crowdsensing
-
Jun
-
J. Ni, A. Zhang, X. Lin, and X. S. Shen, "Security, privacy, and fairness in fog-based vehicular crowdsensing," IEEE Commun. Mag., vol. 55, no. 6, pp. 146-152, Jun. 2017.
-
(2017)
IEEE Commun. Mag.
, vol.55
, Issue.6
, pp. 146-152
-
-
Ni, J.1
Zhang, A.2
Lin, X.3
Shen, X.S.4
-
22
-
-
85021174017
-
A hybrid scheme for fine-grained search and access authorization in fog computing environment
-
Jun
-
M. Xiao, J. Zhou, X. Liu, and M. Jiang, "A hybrid scheme for fine-grained search and access authorization in fog computing environment," Sensors, vol. 17, no. 6, pp. 1-22, Jun. 2017.
-
(2017)
Sensors
, vol.17
, Issue.6
, pp. 1-22
-
-
Xiao, M.1
Zhou, J.2
Liu, X.3
Jiang, M.4
-
23
-
-
85042114742
-
A differential privacy-based query model for sustainable fog data centers
-
to be published
-
M. Du, K. Wang, X. Liu, S. Guo, and Y. Zhang, "A differential privacy-based query model for sustainable fog data centers," IEEE Trans. Sustain. Comput., to be published.
-
IEEE Trans. Sustain. Comput
-
-
Du, M.1
Wang, K.2
Liu, X.3
Guo, S.4
Zhang, Y.5
-
24
-
-
84962076525
-
Fog computing: Issues and challenges in security and forensics
-
Jul
-
Y.Wang, T. Uehara, and R. Sasaki, "Fog computing: Issues and challenges in security and forensics," in Proc. IEEE 39th Annu. Comput. Softw. Appl. Conf., vol. 3. Jul. 2015, pp. 53-59.
-
(2015)
Proc. IEEE 39th Annu. Comput. Softw. Appl. Conf.
, vol.3
, pp. 53-59
-
-
Wang, Y.1
Uehara, T.2
Sasaki, R.3
-
25
-
-
80053414801
-
TrustCloud: A framework for accountability and trust in cloud computing
-
Jul
-
R. K. L. Ko et al., "TrustCloud: A framework for accountability and trust in cloud computing," in Proc. IEEE World Congr. Services, Jul. 2011, pp. 584-588.
-
(2011)
Proc. IEEE World Congr. Services
, pp. 584-588
-
-
Ko, R.K.L.1
-
26
-
-
77957700442
-
Establishing trust in cloud computing
-
Sep.
-
K. M. Khan and Q. Malluhi, "Establishing trust in cloud computing," IT Prof., vol. 12, no. 5, pp. 20-27, Sep. 2010.
-
(2010)
IT Prof.
, vol.12
, Issue.5
, pp. 20-27
-
-
Khan, K.M.1
Malluhi, Q.2
-
27
-
-
84872126433
-
WAKE: Key management scheme for wide-area measurement systems in smart grid
-
Jan
-
Y. W. Law, M. Palaniswami, G. Kounga, and A. Lo, "WAKE: Key management scheme for wide-area measurement systems in smart grid," IEEE Commun. Mag., vol. 51, no. 1, pp. 34-41, Jan. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.1
, pp. 34-41
-
-
Law, Y.W.1
Palaniswami, M.2
Kounga, G.3
Lo, A.4
-
28
-
-
85041790486
-
Privacy-preserving schemes for ad hoc social networks: A survey
-
to be published
-
M. A. Ferrag, L. Maglaras, and A. Ahmim, "Privacy-preserving schemes for ad hoc social networks: A survey," IEEE Commun. Surveys Tuts., to be published.
-
IEEE Commun. Surveys Tuts
-
-
Ferrag, M.A.1
Maglaras, L.2
Ahmim, A.3
-
29
-
-
85021630757
-
Privacy preserving smart meter streaming against information leakage of appliance status
-
Sep.
-
Y. Hong, W. M. Liu, and L. Wang, "Privacy preserving smart meter streaming against information leakage of appliance status," IEEE Trans. Inf. Forensics Security, vol. 12, no. 9, pp. 2227-2241, Sep. 2017.
-
(2017)
IEEE Trans. Inf. Forensics Security
, vol.12
, Issue.9
, pp. 2227-2241
-
-
Hong, Y.1
Liu, W.M.2
Wang, L.3
-
30
-
-
85032357419
-
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
-
to be published
-
D. Koo and J. Hur, "Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing," Future Generat. Comput. Syst., to be published.
-
Future Generat. Comput. Syst
-
-
Koo, D.1
Hur, J.2
-
31
-
-
84864275237
-
Fog Computing: Mitigat-ing Insider Data Theft Attacks in the Cloud
-
May
-
S. J. Stolfo, M. B. Salem, and A. D. Keromytis, "Fog Computing: Mitigat-ing Insider Data Theft Attacks in the Cloud," in Proc. IEEE Symp. Security Privacy Workshops (SPW), May 2012, pp. 125-128.
-
(2012)
Proc. IEEE Symp. Security Privacy Workshops (SPW)
, pp. 125-128
-
-
Stolfo, S.J.1
Salem, M.B.2
Keromytis, A.D.3
-
32
-
-
84991768903
-
Octopus: An edge-fog mutual authentication scheme
-
Nov.
-
M. H. Ibrahim, "Octopus: An edge-fog mutual authentication scheme," Int. J. Netw. Security, vol. 18, no. 6, pp. 1089-1101, Nov. 2016.
-
(2016)
Int. J. Netw. Security
, vol.18
, Issue.6
, pp. 1089-1101
-
-
Ibrahim, M.H.1
-
33
-
-
85012979827
-
UAV-based IoT platform: A crowd surveillance use case
-
Feb.
-
N. H. Motlagh, M. Bagaa, and T. Taleb, "UAV-based IoT platform: A crowd surveillance use case," IEEE Commun. Mag., vol. 55, no. 2, pp. 128-134, Feb. 2017.
-
(2017)
IEEE Commun. Mag.
, vol.55
, Issue.2
, pp. 128-134
-
-
Motlagh, N.H.1
Bagaa, M.2
Taleb, T.3
-
36
-
-
84979609826
-
Fog-computing-based radio access networks: Issues and challenges
-
Jul.
-
M. Peng, S. Yan, K. Zhang, and C. Wang, "Fog-computing-based radio access networks: Issues and challenges," IEEE Netw., vol. 30, no. 4, pp. 46-53, Jul. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.4
, pp. 46-53
-
-
Peng, M.1
Yan, S.2
Zhang, K.3
Wang, C.4
-
37
-
-
84864250473
-
-
Jul,Accessed: Feb. 12, 2017
-
M. Arrington. (Jul. 2009). In Our Inox: Hundreds of Con-dential Twitter Documents. Accessed: Feb. 12, 2017. [Online]. Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-of-con-dential-twitter-documents/
-
(2009)
Our Inox: Hundreds of Con-dential Twitter Documents
-
-
Arrington, M.1
-
42
-
-
85020469257
-
Security and pri-vacy preservation scheme of face identification and resolution framework using Fog computing in Internet of Things
-
to be published
-
P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao, "Security and pri-vacy preservation scheme of face identification and resolution framework using Fog computing in Internet of Things," IEEE Internet Things J., to be published.
-
IEEE Internet Things J
-
-
Hu, P.1
Ning, H.2
Qiu, T.3
Song, H.4
Wang, Y.5
Yao, X.6
-
43
-
-
85018495637
-
A lightweight privacy-preserving data aggregation scheme for Fog computing-enhanced IoT
-
Mar.
-
R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A lightweight privacy-preserving data aggregation scheme for Fog computing-enhanced IoT," IEEE Access, vol. 5, pp. 3302-3312, Mar. 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 3302-3312
-
-
Lu, R.1
Heung, K.2
Lashkari, A.H.3
Ghorbani, A.A.4
-
44
-
-
85021672640
-
A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing
-
Jun
-
S. Basudan, X. Lin, and K. Sankaranarayanan, "A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing," IEEE Internet Things J., vol. 4, no. 3, pp. 772-782, Jun. 2017.
-
(2017)
IEEE Internet Things J.
, vol.4
, Issue.3
, pp. 772-782
-
-
Basudan, S.1
Lin, X.2
Sankaranarayanan, K.3
-
45
-
-
85029660522
-
Secure intelligent traffic light control using fog computing
-
to be published
-
J. Liu et al., "Secure intelligent traffic light control using fog computing," Futur Gener. Comput. Syst., to be published.
-
Futur Gener. Comput. Syst
-
-
Liu, J.1
-
46
-
-
84863584951
-
Private data deduplication protocols in Cloud storage
-
Mar
-
W. K. Ng, Y. Wen, and H. Zhu, "Private data deduplication protocols in Cloud storage," in Proc. 27th Annu. ACM Symp. Appl. Comput. (SAC), Mar. 2012, pp. 441-446.
-
(2012)
Proc. 27th Annu. ACM Symp. Appl. Comput. (SAC)
, pp. 441-446
-
-
Ng, W.K.1
Wen, Y.2
Zhu, H.3
-
47
-
-
85057914009
-
Position based cryptography with location privacy: A step for fog computing
-
to be published
-
R. Yang, Q. Xu, M. H. Au, Z. Yu, H. Wang, and L. Zhou, "Position based cryptography with location privacy: A step for fog computing," Futur Gener. Comput. Syst., to be published.
-
Futur Gener. Comput. Syst
-
-
Yang, R.1
Xu, Q.2
Au, M.H.3
Yu, Z.4
Wang, H.5
Zhou, L.6
-
48
-
-
85028358232
-
Trajectory privacy preservation based on a fog structure for Cloud location services
-
May
-
T.Wang et al., "Trajectory privacy preservation based on a fog structure for Cloud location services," IEEE Access, vol. 5, pp. 7692-7701, May 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 7692-7701
-
-
Wang, T.1
-
49
-
-
85032391108
-
LoDPD: A location difference-based proximity detection protocol for fog computing
-
to be published
-
Y. Huo, C. Hu, X. Qi, and T. Jing, "LoDPD: A location difference-based proximity detection protocol for fog computing," IEEE Internet Things J., to be published.
-
IEEE Internet Things J
-
-
Huo, Y.1
Hu, C.2
Qi, X.3
Jing, T.4
-
50
-
-
84975226328
-
Private proximity detection for convex polygons
-
Jun
-
B. Mu and S. Bakiras, "Private proximity detection for convex polygons," Tsinghua Sci. Technol., vol. 21, no. 3, pp. 270-280, Jun. 2016.
-
(2016)
Tsinghua Sci. Technol.
, vol.21
, Issue.3
, pp. 270-280
-
-
Mu, B.1
Bakiras, S.2
-
51
-
-
85029146894
-
Anonymous and secure aggregation scheme in Fog-based public Cloud computing
-
to be published
-
H. Wang, Z. Wang, and J. Domingo-Ferrer, "Anonymous and secure aggregation scheme in Fog-based public Cloud computing," Futur Gener. Comput. Syst., to be published.
-
Futur Gener. Comput. Syst
-
-
Wang, H.1
Wang, Z.2
Domingo-Ferrer, J.3
-
52
-
-
84875286190
-
An enhanced remote user authentication scheme with smart card
-
May
-
M. Kumar, "An enhanced remote user authentication scheme with smart card," Int. J. Netw. Security, vol. 10, no. 3, pp. 175-184, May 2010.
-
(2010)
Int. J. Netw. Security
, vol.10
, Issue.3
, pp. 175-184
-
-
Kumar, M.1
-
53
-
-
70349791260
-
Asimple user authentication scheme for grid computing
-
R. Lu, Z. Cao, Z. Chai, and X. Liang, "Asimple user authentication scheme for grid computing," Int. J. Netw. Security, vol. 7, no. 2, pp. 202-206, 2008.
-
(2008)
Int. J. Netw. Security
, vol.7
, Issue.2
, pp. 202-206
-
-
Lu, R.1
Cao, Z.2
Chai, Z.3
Liang, X.4
-
54
-
-
78651063942
-
Efficient nonce-based authentication scheme for session initia-tion protocol
-
L. T. Jia, "Efficient nonce-based authentication scheme for session initia-tion protocol," Int. J. Netw. Security, vol. 9, no. 1, pp. 12-16, 2009.
-
(2009)
Int. J. Netw. Security
, vol.9
, Issue.1
, pp. 12-16
-
-
Jia, L.T.1
-
55
-
-
84875095444
-
Guessing attacks on strong-password authentication protocol
-
C. C. Lee, C. H. Liu, and M. S. Hwang, "Guessing attacks on strong-password authentication protocol," Int. J. Netw. Security, vol. 15, no. 1, pp. 64-67, 2013.
-
(2013)
Int. J. Netw. Security
, vol.15
, Issue.1
, pp. 64-67
-
-
Lee, C.C.1
Liu, C.H.2
Hwang, M.S.3
-
56
-
-
79953792812
-
Toward intelligent machine-to-machine communications in smart grid
-
Apr.
-
Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, "Toward intelligent machine-to-machine communications in smart grid," IEEE Commun. Mag., vol. 49, no. 4, pp. 60-65, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 60-65
-
-
Fadlullah, Z.M.1
Fouda, M.M.2
Kato, N.3
Takeuchi, A.4
Iwasaki, N.5
Nozaki, Y.6
-
59
-
-
84904009352
-
Isolating a cloud instance for a digital forensic investigation
-
Aug
-
W. Delport, M. Kohn, and M. S. Olivier, "Isolating a cloud instance for a digital forensic investigation," in Proc. Inf. Security South Africa Conf. (ISSA), Aug. 2012, pp. 1-7.
-
(2012)
Proc. Inf. Security South Africa Conf. (ISSA)
, pp. 1-7
-
-
Delport, W.1
Kohn, M.2
Olivier, M.S.3
-
60
-
-
84941201000
-
Trends and challenges in cloud datacenters
-
May
-
K. Bilal, S. U. R. Malik, S. U. Khan, and A. Y. Zomaya, "Trends and challenges in cloud datacenters," IEEE Cloud Comput., vol. 1, no. 1, pp. 10-20, May 2014.
-
(2014)
IEEE Cloud Comput.
, vol.1
, Issue.1
, pp. 10-20
-
-
Bilal, K.1
Malik, S.U.R.2
Khan, S.U.3
Zomaya, A.Y.4
-
61
-
-
56349150824
-
Market-oriented cloud com-puting: Vision, hype, and reality for delivering IT services as comput-ing utilities
-
Sep
-
R. Buyya, C. S. Yeo, and S. Venugopal, "Market-oriented cloud com-puting: Vision, hype, and reality for delivering IT services as comput-ing utilities," in Proc. 10th IEEE Int. Conf. High Perform. Comput. Commun. (HPCC), Sep. 2008, pp. 5-13.
-
(2008)
Proc. 10th IEEE Int. Conf. High Perform. Comput. Commun. (HPCC
, pp. 5-13
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
62
-
-
73549113094
-
A taxonomy and survey of cloud computing systems
-
Aug
-
B. P. Rimal, E. Choi, and I. Lumb, "A taxonomy and survey of cloud computing systems," in Proc. 5th Int. Joint Conf. INC, Aug. 2009, pp. 44-51.
-
(2009)
Proc. 5th Int. Joint Conf. INC
, pp. 44-51
-
-
Rimal, B.P.1
Choi, E.2
Lumb, I.3
-
63
-
-
84894668409
-
Context aware computing for the Internet of Things: A survey
-
1st Quart
-
C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, "Context aware computing for the Internet of Things: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414-454, 1st Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 414-454
-
-
Perera, C.1
Zaslavsky, A.2
Christen, P.3
Georgakopoulos, D.4
-
64
-
-
84957621961
-
Towards a better understanding of context and context-awareness
-
Sep
-
G. D. Abowd, A. K. Dey, P. J. Brown, N. Davies, M. Smith, and P. Steggles, "Towards a better understanding of context and context-awareness," in Proc. 1st Int. Symp. Handheld Ubiquitous Comput. (HUC), Sep. 1999, pp. 304-307.
-
(1999)
Proc. 1st Int. Symp. Handheld Ubiquitous Comput. (HUC)
, pp. 304-307
-
-
Abowd, G.D.1
Dey, A.K.2
Brown, P.J.3
Davies, N.4
Smith, M.5
Steggles, P.6
-
65
-
-
85009067795
-
Combining ensemble methods and social network metrics for improving accuracy ofOCSVMon intrusion detection in SCADA systems
-
Oct.
-
L. A. Maglaras, J. Jiang, and T. J. Cruz, "Combining ensemble methods and social network metrics for improving accuracy ofOCSVMon intrusion detection in SCADA systems," J. Inf. Security Appl., vol. 30, pp. 15-26, Oct. 2016.
-
(2016)
J. Inf. Security Appl
, vol.30
, pp. 15-26
-
-
Maglaras, L.A.1
Jiang, J.2
Cruz, T.J.3
-
66
-
-
84870696413
-
A survey of intrusion detection techniques in cloud
-
Jan
-
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, "A survey of intrusion detection techniques in cloud," Elsevier J. Netw. Comput. Appl., vol. 36, no. 1, pp. 42-57, Jan. 2013.
-
(2013)
Elsevier J. Netw. Comput. Appl
, vol.36
, Issue.1
, pp. 42-57
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
67
-
-
84886436167
-
Real-time intrusion detection in power system operations
-
Nov.
-
J. Valenzuela, J. Wang, and N. Bissinger, "Real-time intrusion detection in power system operations," IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1052-1062, Nov. 2013.
-
(2013)
IEEE Trans. Power Syst.
, vol.28
, Issue.2
, pp. 1052-1062
-
-
Valenzuela, J.1
Wang, J.2
Bissinger, N.3
-
68
-
-
85020650273
-
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
-
Mar.
-
S. Anwar et al., "From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions," MDPI Algorithms, vol. 10, no. 2, pp. 1-24, Mar. 2017.
-
(2017)
MDPI Algorithms
, vol.10
, Issue.2
, pp. 1-24
-
-
Anwar, S.1
-
69
-
-
85006762171
-
A cyber security detection framework for supervisory control and data acquisition systems
-
Aug.
-
T. Cruz et al., "A cyber security detection framework for supervisory control and data acquisition systems," IEEE Trans. Ind. Informat., vol. 12, no. 6, pp. 2236-2246, Aug. 2016.
-
(2016)
IEEE Trans. Ind. Informat
, vol.12
, Issue.6
, pp. 2236-2246
-
-
Cruz, T.1
-
70
-
-
79959322079
-
Cloud application logging for forensics
-
Mar
-
R. Marty, "Cloud application logging for forensics," in Proc. ACM Symp. Appl. Comput. (SAC), Mar. 2011, pp. 178-184.
-
(2011)
Proc. ACM Symp. Appl. Comput. (SAC)
, pp. 178-184
-
-
Marty, R.1
|