메뉴 건너뛰기




Volumn 5, Issue 2, 2018, Pages 1043-1054

Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks

Author keywords

Cloud computing; fog computing; Internet of Things (IoT); malware; privacy; signaling game

Indexed keywords

CLOUD COMPUTING; COMPUTER CRIME; COMPUTER GAMES; DATA PRIVACY; DIFFUSION; DISTRIBUTED COMPUTER SYSTEMS; FOG; INTERNET OF THINGS; INTRUSION DETECTION; MERCURY (METAL); MONITORING;

EID: 85040924123     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2018.2795549     Document Type: Article
Times cited : (110)

References (60)
  • 1
    • 85014093576 scopus 로고    scopus 로고
    • A survey of standards for machine-to-machine and the internet of things
    • 1st Quart
    • V. Gazis, "A survey of standards for machine-to-machine and the Internet of Things," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 482-511, 1st Quart., 2017.
    • (2017) IEEE Commun. Surveys Tuts. , vol.19 , Issue.1 , pp. 482-511
    • Gazis, V.1
  • 2
    • 84979052575 scopus 로고    scopus 로고
    • Internet of things: A review of surveys based on context aware intelligent services
    • Jul.
    • D. Gil, A. Ferrández, H. Mora-Mora, and J. Peral, "Internet of Things: A review of surveys based on context aware intelligent services," Sensors, vol. 16, no. 7, Jul. 2016, Art. no. E1069.
    • (2016) Sensors , vol.16 , Issue.7
    • Gil, D.1    Ferrández, A.2    Mora-Mora, H.3    Peral, J.4
  • 3
    • 84941085241 scopus 로고    scopus 로고
    • Internet of things: A survey on enabling technologies, protocols, and applications
    • 4th Quart
    • A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications," IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.4 , pp. 2347-2376
    • Al-Fuqaha, A.1    Guizani, M.2    Mohammadi, M.3    Aledhari, M.4    Ayyash, M.5
  • 4
    • 84945392187 scopus 로고    scopus 로고
    • Detecting malicious data injections in wireless sensor networks: A survey
    • Nov.
    • V. P. Illiano and E. C. Lupu, "Detecting malicious data injections in wireless sensor networks: A survey," ACM Comput. Surveys, vol. 48, no. 2, Nov. 2015, Art. no. 24.
    • (2015) ACM Comput. Surveys , vol.48 , Issue.2
    • Illiano, V.P.1    Lupu, E.C.2
  • 5
    • 78649875960 scopus 로고    scopus 로고
    • Arbitrary code injection through self-propagating worms in von Neumann architecture devices
    • Dec.
    • T. Giannetsos, T. Dimitriou, I. Krontiris, and N. R. Prasad, "Arbitrary code injection through self-propagating worms in Von Neumann architecture devices," Comput. J., vol. 53, no. 10, pp. 1576-1593, Dec. 2010.
    • (2010) Comput. J. , vol.53 , Issue.10 , pp. 1576-1593
    • Giannetsos, T.1    Dimitriou, T.2    Krontiris, I.3    Prasad, N.R.4
  • 6
    • 79251600457 scopus 로고    scopus 로고
    • A study of self-propagating malpackets in sensor networks: Attacks and defenses
    • Jan.
    • Q. Gu, C. Ferguson, and R. Noorani, "A study of self-propagating malpackets in sensor networks: Attacks and defenses," Comput. Security, vol. 30, no. 1, pp. 13-27, Jan. 2011.
    • (2011) Comput. Security , vol.30 , Issue.1 , pp. 13-27
    • Gu, Q.1    Ferguson, C.2    Noorani, R.3
  • 7
    • 84975263106 scopus 로고    scopus 로고
    • Improving sensor network immunity under worm attacks: A software diversity approach
    • Sep.
    • Y. Yang, S. Zhu, and G. Cao, "Improving sensor network immunity under worm attacks: A software diversity approach," Ad Hoc Netw., vol. 47, pp. 26-40, Sep. 2016.
    • (2016) Ad Hoc Netw. , vol.47 , pp. 26-40
    • Yang, Y.1    Zhu, S.2    Cao, G.3
  • 8
    • 84919471140 scopus 로고    scopus 로고
    • Defending connected vehicles against malware: Challenges and a solution framework
    • Feb.
    • T. Zhang, H. Antunes, and S. Aggarwal, "Defending connected vehicles against malware: Challenges and a solution framework," IEEE Internet Things J., vol. 1, no. 1, pp. 10-21, Feb. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.1 , pp. 10-21
    • Zhang, T.1    Antunes, H.2    Aggarwal, S.3
  • 9
    • 84962221484 scopus 로고    scopus 로고
    • Modeling malicious activities in cyber space
    • Nov./Dec.
    • S. Yu, G. Wang, and W. Zhou, "Modeling malicious activities in cyber space," IEEE Netw., vol. 29, no. 6, pp. 83-87, Nov./Dec. 2015.
    • (2015) IEEE Netw. , vol.29 , Issue.6 , pp. 83-87
    • Yu, S.1    Wang, G.2    Zhou, W.3
  • 13
    • 85020708599 scopus 로고    scopus 로고
    • Security in internet of things: Issues, challenges, taxonomy, and architecture
    • Jun. 10.1007/s11235-017-0345-9
    • V. Adat and B. B. Gupta, "Security in Internet of Things: Issues, challenges, taxonomy, and architecture," Telecommun. Syst., pp. 1-19, Jun. 2017, 10.1007/s11235-017-0345-9.
    • (2017) Telecommun. Syst. , pp. 1-19
    • Adat, V.1    Gupta, B.B.2
  • 14
    • 84973111531 scopus 로고    scopus 로고
    • A survey of security issues for cloud computing
    • Aug.
    • M. A. Khan, "A survey of security issues for cloud computing," J. Netw. Comput. Appl., vol. 71, pp. 11-29, Aug. 2016.
    • (2016) J. Netw. Comput. Appl. , vol.71 , pp. 11-29
    • Khan, M.A.1
  • 15
    • 84987852363 scopus 로고    scopus 로고
    • A survey on cloud computing security: Issues, threats, and solutions
    • Nov.
    • S. Singh, Y.-S. Jeong, and J. H. Park, "A survey on cloud computing security: Issues, threats, and solutions," J. Netw. Comput. Appl., vol. 75, pp. 200-222, Nov. 2016.
    • (2016) J. Netw. Comput. Appl. , vol.75 , pp. 200-222
    • Singh, S.1    Jeong, Y.-S.2    Park, J.H.3
  • 16
    • 84958935292 scopus 로고    scopus 로고
    • Integration of cloud computing and internet of things: A survey
    • Mar.
    • A. Botta, W. De Donato, V. Persico, and A. Pescapé, "Integration of Cloud computing and Internet of Things: A survey," Future Gener. Comput. Syst., vol. 56, pp. 684-700, Mar. 2016.
    • (2016) Future Gener. Comput. Syst. , vol.56 , pp. 684-700
    • Botta, A.1    De Donato, W.2    Persico, V.3    Pescapé, A.4
  • 17
    • 84922702919 scopus 로고    scopus 로고
    • A stochastic evolutionary coalition game model of secure and dependable virtual service in sensorcloud
    • May
    • J. Liu, S. Shen, G. Yue, R. Han, and H. Li, "A stochastic evolutionary coalition game model of secure and dependable virtual service in sensorcloud," Appl. Soft Comput., vol. 30, pp. 123-135, May 2015.
    • (2015) Appl. Soft Comput. , vol.30 , pp. 123-135
    • Liu, J.1    Shen, S.2    Yue, G.3    Han, R.4    Li, H.5
  • 18
    • 85014086530 scopus 로고    scopus 로고
    • Networking for big data: A survey
    • 1st Quart
    • S. Yu, M. Liu, W. Dou, X. Liu, and S. Zhou, "Networking for big data: A survey," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 531-549, 1st Quart., 2017.
    • (2017) IEEE Commun. Surveys Tuts. , vol.19 , Issue.1 , pp. 531-549
    • Yu, S.1    Liu, M.2    Dou, W.3    Liu, X.4    Zhou, S.5
  • 19
    • 85015190263 scopus 로고    scopus 로고
    • Fog computing for the internet of things: Security and privacy issues
    • Mar./Apr.
    • A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog computing for the Internet of Things: Security and privacy issues," IEEE Internet Comput., vol. 21, no. 2, pp. 34-42, Mar./Apr. 2017.
    • (2017) IEEE Internet Comput. , vol.21 , Issue.2 , pp. 34-42
    • Alrawais, A.1    Alhothaily, A.2    Hu, C.3    Cheng, X.4
  • 20
    • 84979812487 scopus 로고    scopus 로고
    • Big privacy: Challenges and opportunities of privacy study in the age of big data
    • S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data," IEEE Access, vol. 4, pp. 2751-2763, 2016.
    • (2016) IEEE Access , vol.4 , pp. 2751-2763
    • Yu, S.1
  • 21
    • 85019898776 scopus 로고    scopus 로고
    • Game theory for cyber security and privacy
    • Jun.
    • C. T. Do et al., "Game theory for cyber security and privacy," ACM Comput. Surveys, vol. 50, no. 2, Jun. 2017, Art. no. 30.
    • (2017) ACM Comput. Surveys , vol.50 , Issue.2
    • Do, C.T.1
  • 23
    • 84973610948 scopus 로고    scopus 로고
    • Reliability evaluation for clustered WSNs under malware propagation
    • Jun.
    • S. Shen et al., "Reliability evaluation for clustered WSNs under malware propagation," Sensors, vol. 16, no. 6, Jun. 2016, Art. no. 855.
    • (2016) Sensors , vol.16 , Issue.6
    • Shen, S.1
  • 24
    • 85019114799 scopus 로고    scopus 로고
    • A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion
    • Aug.
    • S. Shen et al., "A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion," J. Netw. Comput. Appl., vol. 91, pp. 26-35, Aug. 2017.
    • (2017) J. Netw. Comput. Appl. , vol.91 , pp. 26-35
    • Shen, S.1
  • 25
    • 85010041836 scopus 로고    scopus 로고
    • Deceptive attack and defense game in honeypot-enabled networks for the internet of things
    • Dec.
    • Q. D. La, T. Q. S. Quek, J. Lee, S. Jin, and H. Zhu, "Deceptive attack and defense game in honeypot-enabled networks for the Internet of Things," IEEE Internet Things J., vol. 3, no. 6, pp. 1025-1035, Dec. 2016.
    • (2016) IEEE Internet Things J. , vol.3 , Issue.6 , pp. 1025-1035
    • La, Q.D.1    Quek, T.Q.S.2    Lee, J.3    Jin, S.4    Zhu, H.5
  • 26
    • 84986218436 scopus 로고    scopus 로고
    • Economics of internet of things: An information market approach
    • Aug.
    • D. Niyato, X. Lu, P. Wang, D. I. Kim, and Z. Han, "Economics of Internet of Things: An information market approach," IEEE Wireless Commun., vol. 23, no. 4, pp. 136-145, Aug. 2016.
    • (2016) IEEE Wireless Commun. , vol.23 , Issue.4 , pp. 136-145
    • Niyato, D.1    Lu, X.2    Wang, P.3    Kim, D.I.4    Han, Z.5
  • 27
    • 84914816062 scopus 로고    scopus 로고
    • Information fusion to defend intentional attack in internet of things
    • Aug.
    • P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Information fusion to defend intentional attack in Internet of Things," IEEE Internet Things J., vol. 1, no. 4, pp. 337-348, Aug. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.4 , pp. 337-348
    • Chen, P.-Y.1    Cheng, S.-M.2    Chen, K.-C.3
  • 28
    • 84976562123 scopus 로고    scopus 로고
    • Game theory meets wireless sensor networks security requirements and threats mitigation: A survey
    • Jun.
    • M. S. Abdalzaher et al., "Game theory meets wireless sensor networks security requirements and threats mitigation: A survey," Sensors, vol. 16, no. 7, Jun. 2016, Art. no. E1003.
    • (2016) Sensors , vol.16 , Issue.7
    • Abdalzaher, M.S.1
  • 29
    • 84905736269 scopus 로고    scopus 로고
    • A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks
    • Sep.
    • H. Moosavi and F. M. Bui, "A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 9, pp. 1367-1379, Sep. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.9 , pp. 1367-1379
    • Moosavi, H.1    Bui, F.M.2
  • 30
    • 84908240474 scopus 로고    scopus 로고
    • Differential game-based strategies for preventing malware propagation in wireless sensor networks
    • Nov.
    • S. Shen et al., "Differential game-based strategies for preventing malware propagation in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1962-1973, Nov. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.11 , pp. 1962-1973
    • Shen, S.1
  • 31
    • 85018921813 scopus 로고    scopus 로고
    • Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: A Bayesian game-theoretic methodology
    • May
    • H. Sedjelmaci, S. M. Senouci, and N. Ansari, "Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: A Bayesian game-theoretic methodology," IEEE Trans. Intell. Transp. Syst., vol. 18, no. 5, pp. 1143-1153, May 2017.
    • (2017) IEEE Trans. Intell. Transp. Syst. , vol.18 , Issue.5 , pp. 1143-1153
    • Sedjelmaci, H.1    Senouci, S.M.2    Ansari, N.3
  • 32
    • 84983320365 scopus 로고    scopus 로고
    • To delay or not: Temporal vaccination games on networks
    • San Francisco, CA, USA
    • A. Adiga, S. Venkat, and A. Vullikanti, "To delay or not: Temporal vaccination games on networks," in Proc. IEEE INFOCOM, San Francisco, CA, USA, 2016, pp. 1-9.
    • (2016) Proc. IEEE INFOCOM , pp. 1-9
    • Adiga, A.1    Venkat, S.2    Vullikanti, A.3
  • 33
    • 84992213754 scopus 로고    scopus 로고
    • Game-theory-based active defense for intrusion detection in cyber-physical embedded systems
    • Nov.
    • K. Wang et al., "Game-theory-based active defense for intrusion detection in cyber-physical embedded systems," ACM Trans. Embedded Comput. Syst., vol. 16, no. 1, Nov. 2016, Art. no. 18.
    • (2016) ACM Trans. Embedded Comput. Syst. , vol.16 , Issue.1
    • Wang, K.1
  • 34
    • 84988640333 scopus 로고    scopus 로고
    • A three-way decision making approach to malware analysis using probabilistic rough sets
    • Dec.
    • M. Nauman, N. Azam, and J. Yao, "A three-way decision making approach to malware analysis using probabilistic rough sets," Inf. Sci., vol. 374, pp. 193-209, Dec. 2016.
    • (2016) Inf. Sci. , vol.374 , pp. 193-209
    • Nauman, M.1    Azam, N.2    Yao, J.3
  • 35
    • 85028048302 scopus 로고    scopus 로고
    • Epidemic protection over heterogeneous networks using evolutionary Poisson games
    • Aug.
    • Y. Hayel and Q. Zhu, "Epidemic protection over heterogeneous networks using evolutionary Poisson games," IEEE Trans. Inf. Forensics Security, vol. 12, no. 8, pp. 1786-1800, Aug. 2017.
    • (2017) IEEE Trans. Inf. Forensics Security , vol.12 , Issue.8 , pp. 1786-1800
    • Hayel, Y.1    Zhu, Q.2
  • 36
    • 84922357776 scopus 로고    scopus 로고
    • Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach
    • Jul.
    • Y. Yuan, F. Sun, and H. Liu, "Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach," Int. J. Syst. Sci., vol. 47, no. 9, pp. 2067-2077, Jul. 2016.
    • (2016) Int. J. Syst. Sci. , vol.47 , Issue.9 , pp. 2067-2077
    • Yuan, Y.1    Sun, F.2    Liu, H.3
  • 37
    • 84943272411 scopus 로고    scopus 로고
    • Mobile cloud offloading for malware detections with learning
    • Y. Li, J. Liu, Q. Li, and L. Xiao, "Mobile cloud offloading for malware detections with learning," in Proc. IEEE INFOCOM, 2015, pp. 197-201.
    • (2015) Proc. IEEE INFOCOM , pp. 197-201
    • Li, Y.1    Liu, J.2    Li, Q.3    Xiao, L.4
  • 38
    • 85029672508 scopus 로고    scopus 로고
    • Cloud-based malware detection game for mobile devices with offloading
    • Oct.
    • L. Xiao, Y. Li, X. Huang, and X. Du, "Cloud-based malware detection game for mobile devices with offloading," IEEE Trans. Mobile Comput., vol. 16, no. 10, pp. 2742-2750, Oct. 2017.
    • (2017) IEEE Trans. Mobile Comput. , vol.16 , Issue.10 , pp. 2742-2750
    • Xiao, L.1    Li, Y.2    Huang, X.3    Du, X.4
  • 39
    • 84906258306 scopus 로고    scopus 로고
    • Evolutionary dynamics of information diffusion over social networks
    • Sep.
    • C. Jiang, Y. Chen, and K. J. R. Liu, "Evolutionary dynamics of information diffusion over social networks," IEEE Trans. Signal Process., vol. 62, no. 17, pp. 4573-4586, Sep. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.17 , pp. 4573-4586
    • Jiang, C.1    Chen, Y.2    Liu, K.J.R.3
  • 40
    • 84904667776 scopus 로고    scopus 로고
    • Graphical evolutionary game for information diffusion over social networks
    • Aug.
    • C. Jiang, Y. Chen, and K. J. R. Liu, "Graphical evolutionary game for information diffusion over social networks," IEEE J. Sel. Topics Signal Process., vol. 8, no. 4, pp. 524-536, Aug. 2014.
    • (2014) IEEE J. Sel. Topics Signal Process. , vol.8 , Issue.4 , pp. 524-536
    • Jiang, C.1    Chen, Y.2    Liu, K.J.R.3
  • 41
    • 84971463486 scopus 로고    scopus 로고
    • On maximizing diffusion speed over social networks with strategic users
    • Dec.
    • J. Ok, Y. Jin, J. Shin, and Y. Yi, "On maximizing diffusion speed over social networks with strategic users," IEEE/ACM Trans. Netw., vol. 24, no. 6, pp. 3798-3811, Dec. 2016.
    • (2016) IEEE/ACM Trans. Netw. , vol.24 , Issue.6 , pp. 3798-3811
    • Ok, J.1    Jin, Y.2    Shin, J.3    Yi, Y.4
  • 42
    • 84980398323 scopus 로고    scopus 로고
    • Infection spreading and source identification: A hide and seek game
    • Aug.
    • W. Luo, W. P. Tay, and M. Leng, "Infection spreading and source identification: A hide and seek game," IEEE Trans. Signal Process., vol. 64, no. 16, pp. 4228-4243, Aug. 2016.
    • (2016) IEEE Trans. Signal Process. , vol.64 , Issue.16 , pp. 4228-4243
    • Luo, W.1    Tay, W.P.2    Leng, M.3
  • 43
    • 85017503282 scopus 로고    scopus 로고
    • Modeling for information diffusion in online social networks via hydrodynamics
    • Y. Hu, R. J. Song, and M. Chen, "Modeling for information diffusion in online social networks via hydrodynamics," IEEE Access, vol. 5, pp. 128-135, 2017.
    • (2017) IEEE Access , vol.5 , pp. 128-135
    • Hu, Y.1    Song, R.J.2    Chen, M.3
  • 45
    • 85008234792 scopus 로고    scopus 로고
    • Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach
    • Jan.
    • H. Bostani and M. Sheikhan, "Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach," Comput. Commun., vol. 98, pp. 52-71, Jan. 2017.
    • (2017) Comput. Commun. , vol.98 , pp. 52-71
    • Bostani, H.1    Sheikhan, M.2
  • 46
    • 85009909010 scopus 로고    scopus 로고
    • CLAPP: A self constructing feature clustering approach for anomaly detection
    • Sep.
    • R. K. Gunupudi, M. Nimmala, N. Gugulothu, and S. R. Gali, "CLAPP: A self constructing feature clustering approach for anomaly detection," Future Gener. Comput. Syst., vol. 74, pp. 417-429, Sep. 2017.
    • (2017) Future Gener. Comput. Syst. , vol.74 , pp. 417-429
    • Gunupudi, R.K.1    Nimmala, M.2    Gugulothu, N.3    Gali, S.R.4
  • 47
    • 85006802692 scopus 로고    scopus 로고
    • DFA-AD: A distributed framework architecture for the detection of advanced persistent threats
    • Mar.
    • P. K. Sharma, S. Y. Moon, D. Moon, and J. H. Park, "DFA-AD: A distributed framework architecture for the detection of advanced persistent threats," Cluster Comput., vol. 20, no. 1, pp. 597-609, Mar. 2017.
    • (2017) Cluster Comput. , vol.20 , Issue.1 , pp. 597-609
    • Sharma, P.K.1    Moon, S.Y.2    Moon, D.3    Park, J.H.4
  • 48
    • 84885328301 scopus 로고    scopus 로고
    • SVELTE: Real-time intrusion detection in the internet of things
    • Nov.
    • S. Raza, L. Wallgren, and T. Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things," Ad Hoc Netw., vol. 11, no. 8, pp. 2661-2674, Nov. 2013.
    • (2013) Ad Hoc Netw. , vol.11 , Issue.8 , pp. 2661-2674
    • Raza, S.1    Wallgren, L.2    Voigt, T.3
  • 49
    • 84900000372 scopus 로고    scopus 로고
    • Security as a service model for cloud environment
    • Mar.
    • V. Varadharajan and U. Tupakula, "Security as a service model for cloud environment," IEEE Trans. Netw. Service Manag., vol. 11, no. 1, pp. 60-75, Mar. 2014.
    • (2014) IEEE Trans. Netw. Service Manag. , vol.11 , Issue.1 , pp. 60-75
    • Varadharajan, V.1    Tupakula, U.2
  • 50
    • 84977485940 scopus 로고    scopus 로고
    • CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices
    • Mar.
    • H. Sun, X. Wang, R. Buyya, and J. Su, "CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained Internet of Things (IoT) devices," Softw. Pract. Exp., vol. 47, no. 3, pp. 421-441, Mar. 2017.
    • (2017) Softw. Pract. Exp. , vol.47 , Issue.3 , pp. 421-441
    • Sun, H.1    Wang, X.2    Buyya, R.3    Su, J.4
  • 51
    • 85021783326 scopus 로고    scopus 로고
    • Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: A contract design approach
    • Nov.
    • J. Chen and Q. Zhu, "Security as a service for cloud-enabled Internet of controlled things under advanced persistent threats: A contract design approach," IEEE Trans. Inf. Forensics Security, vol. 12, no. 11, pp. 2736-2750, Nov. 2017.
    • (2017) IEEE Trans. Inf. Forensics Security , vol.12 , Issue.11 , pp. 2736-2750
    • Chen, J.1    Zhu, Q.2
  • 52
    • 84983503423 scopus 로고    scopus 로고
    • On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
    • Oct.
    • S. Iqbal et al., "On cloud security attacks: A taxonomy and intrusion detection and prevention as a service," J. Netw. Comput. Appl., vol. 74, pp. 98-120, Oct. 2016.
    • (2016) J. Netw. Comput. Appl. , vol.74 , pp. 98-120
    • Iqbal, S.1
  • 53
    • 85021058978 scopus 로고    scopus 로고
    • IFCIoT: Integrated fog cloud IoT: A novel architectural paradigm for the future internet of things
    • Jul.
    • A. Munir, P. Kansakar, and S. U. Khan, "IFCIoT: Integrated fog cloud IoT: A novel architectural paradigm for the future Internet of Things," IEEE Consum. Electron. Mag., vol. 6, no. 3, pp. 74-82, Jul. 2017.
    • (2017) IEEE Consum. Electron. Mag. , vol.6 , Issue.3 , pp. 74-82
    • Munir, A.1    Kansakar, P.2    Khan, S.U.3
  • 54
    • 85010031130 scopus 로고    scopus 로고
    • Fog and IoT: An overview of research opportunities
    • Dec.
    • M. Chiang and T. Zhang, "Fog and IoT: An overview of research opportunities," IEEE Internet Things J., vol. 3, no. 6, pp. 854-864, Dec. 2016.
    • (2016) IEEE Internet Things J. , vol.3 , Issue.6 , pp. 854-864
    • Chiang, M.1    Zhang, T.2
  • 55
    • 85012981859 scopus 로고    scopus 로고
    • EdgeIoT: Mobile edge computing for the internet of things
    • Dec.
    • X. Sun and N. Ansari, "EdgeIoT: Mobile edge computing for the Internet of Things," IEEE Commun. Mag., vol. 54, no. 12, pp. 22-29, Dec. 2016.
    • (2016) IEEE Commun. Mag. , vol.54 , Issue.12 , pp. 22-29
    • Sun, X.1    Ansari, N.2
  • 56
    • 85012170641 scopus 로고    scopus 로고
    • Foggy clouds and cloudy fogs: A real need for coordinated management of fog-to-cloud computing systems
    • Oct.
    • X. Masip-Bruin, E. Marín-Tordera, G. Tashakor, A. Jukan, and G.-J. Ren, "Foggy clouds and cloudy fogs: A real need for coordinated management of fog-to-cloud computing systems," IEEE Wireless Commun., vol. 23, no. 5, pp. 120-128, Oct. 2016.
    • (2016) IEEE Wireless Commun. , vol.23 , Issue.5 , pp. 120-128
    • Masip-Bruin, X.1    Marín-Tordera, E.2    Tashakor, G.3    Jukan, A.4    Ren, G.-J.5
  • 57
    • 84986211321 scopus 로고    scopus 로고
    • Fog computing: Helping the internet of things realize its potential
    • Aug.
    • A. V. Dastjerdi and R. Buyya, "Fog computing: Helping the Internet of Things realize its potential," Computer, vol. 49, no. 8, pp. 112-116, Aug. 2016.
    • (2016) Computer , vol.49 , Issue.8 , pp. 112-116
    • Dastjerdi, A.V.1    Buyya, R.2
  • 58
    • 84894652457 scopus 로고    scopus 로고
    • A survey of intrusion detection systems in wireless sensor networks
    • 1st Quart
    • I. Butun, S. D. Morgera, and R. Sankar, "A survey of intrusion detection systems in wireless sensor networks," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 266-282, 1st Quart., 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.1 , pp. 266-282
    • Butun, I.1    Morgera, S.D.2    Sankar, R.3
  • 59
    • 85021862331 scopus 로고    scopus 로고
    • On the tradeoff between privacy and utility in collaborative intrusion detection systems-A game theoretical approach
    • R. Jin, X. He, and H. Dai, "On the tradeoff between privacy and utility in collaborative intrusion detection systems-A game theoretical approach," in Proc. ACM Int. Conf. HoTSoS, 2017, pp. 45-51.
    • (2017) Proc. ACM Int. Conf. HoTSoS , pp. 45-51
    • Jin, R.1    He, X.2    Dai, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.