From security to assurance in the cloud: A survey
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …
business processes and applications. In the public cloud vision, infrastructure, platform, and …
Federated cloud resource management: Review and discussion
Federation of clouds is the future of cloud computing, mobile cloud computing, Internet of
things, and big data applications. The utilization of federated resources is envisioned to …
things, and big data applications. The utilization of federated resources is envisioned to …
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …
Optimizing top precision performance measure of content-based image retrieval by learning similarity function
In this paper we study the problem of content-based image retrieval. In this problem, the
most popular performance measure is the top precision measure, and the most important …
most popular performance measure is the top precision measure, and the most important …
Cybersecurity dynamics: A foundation for the science of cybersecurity
S Xu - Proactive and dynamic network defense, 2019 - Springer
Cybersecurity Dynamics is new concept that aims to achieve the modeling, analysis,
quantification, and management of cybersecurity from a holistic perspective, rather than from …
quantification, and management of cybersecurity from a holistic perspective, rather than from …
Security and privacy issues and solutions for fog
This chapter presents an overview of the primary security and privacy issues in fog
computing. It discusses the state‐of‐the‐art solutions that deal with fog computing‐related …
computing. It discusses the state‐of‐the‐art solutions that deal with fog computing‐related …
A novel transfer learning method based on common space map** and weighted domain matching
In this paper, we propose a novel learning framework for the problem of domain transfer
learning. We map the data of two domains to one single common space, and learn a …
learning. We map the data of two domains to one single common space, and learn a …
A comprehensive review of distributed denial of service (DDoS) attacks in fog computing environment
B Paharia, K Bhushan - Handbook of Computer Networks and Cyber …, 2020 - Springer
Cloud computing performs several functionalities, and one of the most important
functionalities is the storage and processing of data or information. With day-by-day …
functionalities is the storage and processing of data or information. With day-by-day …
Fog and fogonomics: challenges and practices of fog computing, communication, networking, strategy, and economics
THE ONE-STOP RESOURCE FOR ANY INDIVIDUAL OR ORGANIZATION CONSIDERING
FOG COMPUTING Fog and Fogonomics is a comprehensive and technology-centric …
FOG COMPUTING Fog and Fogonomics is a comprehensive and technology-centric …
Nodal authentication of IoT data using blockchain
BT Asare, K Quist–Aphetsi… - … international conference on …, 2019 - ieeexplore.ieee.org
Pervasive systems over the years continuous to grow exponentially. Engagement of IoT in
fields such as Agriculture, Home automation, industrial applications etc is on the rise. Self …
fields such as Agriculture, Home automation, industrial applications etc is on the rise. Self …