Computing paradigms in emerging vehicular environments: A review

L Silva, N Magaia, B Sousa… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
Determining how to structure vehicular network environments can be done in various ways.
Here, we highlight vehicle networks' evolution from vehicular ad-hoc networks (VANET) to …

Digital Twin in Industries: A Comprehensive Survey

MBA Zami, S Shaon, VK Quy, DC Nguyen - arxiv preprint arxiv …, 2024 - arxiv.org
Industrial networks are undergoing rapid transformation driven by the convergence of
emerging technologies that are revolutionizing conventional workflows, enhancing …

A novel blockchain-based encryption model to protect fog nodes from behaviors of malicious nodes

M Alshehri, B Panda, S Almakdi, A Alazeb, H Halawani… - Electronics, 2021 - mdpi.com
The world has experienced a huge advancement in computing technology. People prefer
outsourcing their confidential data for storage and processing in cloud computing because …

A secure framework for the cloud to protect the virtual machine from malicious events

P Neelakantan - Multimedia Tools and Applications, 2023 - Springer
Abstract In recent years, Virtual Machine (VM) has played an important role for cloud
computing applications to execute the assigned user tasks. However, the cloud is a big open …

Damage Assessment in Fog Computing Systems: A Blind Write Lineage Approach

MS Ahmad, B Panda - 2024 IEEE 24th International …, 2024 - ieeexplore.ieee.org
The concept of fog computing emerged as an expansion of cloud computing, aiming to
address issues such as time latency, communication overhead, and the proximity of …

Navigating Fog Federation: Classifying Current Research and Identifying Challenges

D Patel, SP Malukani - arxiv preprint arxiv:2411.15573, 2024 - arxiv.org
Fog computing has gained significant attention for its potential to enhance resource
management and service delivery by bringing computation closer to the network edge …

A Review for Fog-Cloud Security: Aspects, Attacks, Solutions, and Trends

MAQ Al-Riyashi, AT Zahary… - Sana'a University Journal …, 2024 - journals.su.edu.ye
Nowadays, different structures are support clients to hosting their data via cloud computing.
A fog-cloud is a part of cloud computing that decentralized computing pattern to get …

A Systematic Review-Attack and Security Issues in FOG Computing

C Sabarinathan, B Baranidharan - IoT Based Control Networks and …, 2022 - Springer
Fog computing is a modern era that expands the cloud computing system infrastructure by
offering computer resources at the edge devices. It could be mentioned as a platform of …

A quantitative study on the effect of cognitive trust and emotional violation on repurchase intention after a data breach

L Leussen - 2023 - essay.utwente.nl
In today's society, where the internet continues to grow, more and more companies are
using online data. Because these companies are so dependent on this online data, it makes …

[BUKU][B] Securing Fog Federation from Behavior of Rogue Nodes

MSH Alshehri - 2021 - search.proquest.com
As the technological revolution advanced information security evolved with an in-creased
need for condential data protection on the internet. Individuals and organizationstypically …