A comprehensive analysis of computing paradigms leading to fog computing: simulation tools, applications, and use cases

S Patel, R Patel - Journal of Computer Information Systems, 2023‏ - Taylor & Francis
The emerging trend of computing technologies and the Internet of Things (IoT) makes
applications optimal and more responsive for real-time data processing. It generates an …

Cloud to cloud data migration using self sovereign identity for 5G and beyond

MG Aruna, MK Hasan, S Islam, KG Mohan, P Sharan… - Cluster computing, 2022‏ - Springer
The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-
based services. The pandemic is causing an explosion in cloud migration, expected that by …

Provably efficient security-aware service function tree composing and embedding in multi-vendor networks

D Zheng, H **ng, L Feng, X Cao - Computer Networks, 2024‏ - Elsevier
Multicast greatly benefits many emerging applications such as federated learning,
metaverse, and data warehouse. Recently, due to frequent cyber-attacks, multicast services …

An optimized human resource management model for cloud-edge computing in the internet of things

Y Liu, W Zhang, Q Zhang, M Norouzi - Cluster Computing, 2022‏ - Springer
The use of cloud-edge technology creates significant potential for cost reduction, efficiency
and resource management. These features have encouraged users and organizations to …

Federated-learning-based decision support for industrial internet of things (iiot)-based printed circuit board assembly process

YP Tsang, CH Wu, WH Ip, CKM Lee - Journal of Grid Computing, 2022‏ - Springer
Solder paste printing (SPP) is one of the critical processes for the printed circuit board
assembly to reliably apply the solder paste on raw PCBs for the component placement …

Security-aware Service Function Chaining and Embedding with Asymmetric Dedicated Protection

B Wang, J Li, S Cao, E Guler, D Zheng - IEEE Access, 2024‏ - ieeexplore.ieee.org
In the 5G and beyond 5G networks, achieving security-aware data transmission needs to
convert clients' requests into a service function chain (SFC), each service function (SF) …

Reliability-assured service function chain migration strategy in edge networks using deep reinforcement learning

Y Li, P Zhang, N Kumar, M Guizani, J Wang… - Journal of Network and …, 2024‏ - Elsevier
With the widespread adoption of edge computing and the rollout of 5G technology, the edge
network is experiencing rapid growth. Edge computing enables the execution of certain …

Cost optimization in security-aware service function chain deployment with diverse vendors

D Zheng, X Liu, W Tang, H Xu… - GLOBECOM 2023-2023 …, 2023‏ - ieeexplore.ieee.org
Frequent cyber-attacks force the service provider to employ security-aware service functions
(SFs) to accommodate client network requests. Thanks to virtualization techniques' maturity …

Efficient and secure service function chain deployment method for delay optimization in air traffic information network

Y Yang, B Wang, R Guo, J Tian, P Luo, D Li, X Li - Scientific Reports, 2024‏ - nature.com
The air traffic information network is fundamental for ensuring the efficient and safe
operation of flights. However, with the increasing demands of air traffic services, the rigidity …