共 75 条
[41]
Fog computing security: a review of current applications and security solutions
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2017, 6
[42]
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
[J].
APPLIED SCIENCES-BASEL,
2019, 9 (01)
[43]
Lee Heejo., 2007, Proceedings of the 2nd ACM symposium on Information, computer and communications security, P20
[44]
Lee K, 2015, INT CONF NETW FUT
[45]
Li J, 2002, IEEE INFOCOM SER, P1557, DOI 10.1109/INFCOM.2002.1019407
[46]
Liu J., 2012, PROC IEEE 32 INT C, P588, DOI [DOI 10.1109/ICDCSW.2012.23, 10.1109/icdcsw.2012.23]
[47]
Mallik A., 2018, Cyberspace: Jurnal Pendidikan Teknologi Informasi, V2, P109
[49]
Mustafa A., 2015, THESIS HALMSTAD U UK
[50]
Nasr OA, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P93, DOI 10.1109/FMEC.2018.8364050