共 58 条
[1]
Abdulhamid S.M., Latiff M.S., A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness, Appl Soft Comput, 61, pp. 670-680, (2017)
[2]
Abbasi B.Z., Shah M.A., Robust practices, Proceedings of the 23Rd International Conference on Automation & Computing, University of Hudders Field, Hudders Field, pp. 7-8, (2017)
[3]
Arya D., Dave M., Security-based service broker policy for fog computing environment, IEEE 8Th ICCCNT 2017, (2017)
[4]
Barik R.K., Dubey A.C., Tripathi A., Pratik T., Lenka K., Pratik T., Et al., Mist data: leveraging mist computing for secure and scalable architecture for smart and connected health, Procedia Comput Sci, 125, pp. 647-653, (2018)
[5]
Bedi R.K., Singh J., Gupta S.K., MWC: an efficient and secure multi-cloud storage approach to leverage augmentation of multi-cloud storage services on mobile devices using fog computing, J Supercomput, (2018)
[6]
Bilal K., Khalid O., Erbad A., Khan S.U., Potentials, trends, and prospects in edge technologies: fog, cloudlet, mobile edge, and micro data centers, Comput Netw, 130, pp. 94-120, (2018)
[7]
Christopher H.A., Yakubu J., Mohammed A.D., An architectural framework for ant lion optimization-based feature selection technique for cloud intrusion detection system using bayesian classifier, imanagers J Cloud Comput, 5, 2, (2018)
[8]
Donovan P.O., Gallagher C., Bruton K., Sullivan D.T.J.O., A fog computing industrial cyber-physical system for embedded low-latency machine learning industry 4.0 applications, Manuf Lett, (2018)
[9]
Ebebe A., Naveen C., Deep learning: the frontier for distributed attack detection in fog-to-things computing, IEEE Commun Mag, 56, pp. 169-175, (2018)
[10]
El-Latif A.A.A., Abd-El-Atty B., Hossain M.S., Member S., Secure quantum steganography protocol for fog cloud internet of things, IEEE Spec Sect Recent Adv Cloud Radio Access Netw, 6, pp. 10332-10340, (2018)