共 45 条
[1]
Identifying cyber threats to mobile-loT applications in edge computing paradigm
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 89
:525-538
[2]
Asheralieva A., 2020, IEEE INTERNET THINGS, p11 830
[3]
Buccafurri Francesco, 2015, Electronic Government, V11, P185
[4]
Buccafurri Francesco, 2014, Electronic Government and the Information Systems Perspective. Third International Conference (EGOVIS 2014). Proceedings: LNCS 8650, P1, DOI 10.1007/978-3-319-10178-1_1
[5]
Buccafurri Francesco, 2013, Technology-Enabled Innovation for Democracy, Government and Governance. 2nd Joint International Conference on Electronic Government and the Information Systems Perspective and Electronic Democracy, EGOVIS/EDEM 2013. Proceedings: LNCS 8061, P241, DOI 10.1007/978-3-642-40160-2_19
[6]
Buccafurri F., 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST), P51, DOI 10.1109/PST.2012.6297919
[7]
Buccafurri F., 2012, INT C EL GOV INF SYS, VVolume 7452, P242, DOI 10.1007/978-3-642-32701-8_21
[8]
Chen J., 2020, IEEE Trans Softw Eng
[9]
Trust Management in Fog/Edge Computing by means of Blockchain Technologies
[J].
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY,
2018,
:1433-1439
[10]
Comi A., 2016, INT S INTELLIGENT DI, P143