Security issues in fog environment: a systematic literature review

J Kaur, A Agrawal, RA Khan - International Journal of Wireless Information …, 2020 - Springer
The potent concept of fog computing is currently attracting many researchers as it brings
cloud services closer to the end-user. It also roots out some of the major limitations of the …

Security in fog computing: A systematic review on issues, challenges and solutions

R Rezapour, P Asghari, HHS Javadi… - Computer Science Review, 2021 - Elsevier
Fog computing refers to cloud computing development to the edge of a corporate network.
Fog computing, as a promising computing paradigm, facilitates computing, storing and …

Application of quantum genetic optimization of LVQ neural network in smart city traffic network prediction

F Zhang, TY Wu, Y Wang, R **ong, G Ding, P Mei… - IEEE …, 2020 - ieeexplore.ieee.org
Accurate prediction of traffic flow in urban networks is of great significance for smart city
management. A short-term traffic flow prediction algorithm of Quantum Genetic Algorithm …

Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art

YI Alzoubi, VH Osmanaj, A Jaradat… - Security and …, 2021 - Wiley Online Library
Fog nodes are implemented near to end‐users Internet of Things (IoT) devices, which
mitigate the impact of low latency, location awareness, and geographic distribution …

Analysis of security and privacy issues of information management of big data in B2B based healthcare systems

BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023 - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …

An enhanced pairing-based authentication scheme for smart grid communications

TY Wu, YQ Lee, CM Chen, Y Tian… - Journal of Ambient …, 2021 - Springer
To ensure that messages can be securely transmitted between different entities in a smart
grid, many researchers have focused on authentication and key exchange schemes. Chen …

Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …

Research on the Influence of AI and VR Technology for Students' Concentration and Creativity

Q Rong, Q Lian, T Tang - Frontiers in psychology, 2022 - frontiersin.org
The application of digital technology in teaching has triggered the evolution of traditional
teaching. Students have different corresponding relationships under digital behavior. The …

Improved authenticated key agreement scheme for fog‐driven IoT healthcare system

TY Wu, T Wang, YQ Lee, W Zheng… - Security and …, 2021 - Wiley Online Library
The Internet of things (IoT) has been widely used for various applications including medical
and transportation systems, among others. Smart medical systems have become the most …

Exploring the factors influencing users' learning and sharing behavior on social media platforms

J Wang, J **e - Library Hi Tech, 2023 - emerald.com
Purpose The research goal is to understand what factors affect users' knowledge and
information learning and sharing on social media platforms. This study focuses on the …