Linked e-resources

Details

Part I: Overview of Fog/Edge Computing
1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues"
2. "An overview of the Edge Computing in Modern Digital Age"
Part II: Security in Fog/Edge Computing
3. "Secure Search and Storage Services in Fog/Edge Computing"
4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing"
5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management"
Part III: Privacy in Fog/Edge Computing.-6. "Privacy Issues in Edge Computing"
7. "Privacy-preserving Edge Video Analytics"
Part IV: Architectural Design in Fog/Edge Computing
8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives"
9. "Security and Intelligent Management for Fog/Edge Computing Resources"
10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing"
11. "Blockchain-based Security Services for Fog Computing". Part V: Applications of Fog/Edge Computing
12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions"
13. "Security Problems in Edge Computing and Augmented Reality"
14. "Towards a Security-aware Deployment of Data Streaming Applications in Fog Computing"
15. "Blockchain of Finite-Lifetime Blocks for Edge-IoT Applications."

Browse Subjects

Show more subjects...

Statistics

from
to
Export