UM

Browse/Search Results:  1-3 of 3 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Big data mining algorithms for fog computing Conference paper
ACM International Conference Proceeding Series
Authors:  Fong S.
Favorite | View/Download:7/0 | TC[WOS]:1 TC[Scopus]:1 | Submit date:2019/02/13
Computer network security  Security threats  SME  
Fog-based evaluation approach for trustworthy communication in sensor-cloud system Journal article
IEEE Communications Letters, 2017,Volume: 21,Issue: 11,Page: 2532-2535
Authors:  Wang T.;  Li Y.;  Chen Y.;  Tian H.;  Cai Y.;  Jia W.;  Wang B.
Favorite | View/Download:4/0 | TC[WOS]:5 TC[Scopus]:15 | Submit date:2019/02/11
least squares  multiple linear regression  security  Sensor-cloud system  trust  
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications Journal article
IEEE INTERNET OF THINGS JOURNAL, 2017,Volume: 4,Issue: 5,Page: 1125-1142
Authors:  Lin, Jie;  Yu, Wei;  Zhang, Nan;  Yang, Xinyu;  Zhang, Hanlin;  Zhao, Wei
Favorite | View/Download:44/0 | TC[WOS]:461 TC[Scopus]:867 | Submit date:2018/10/30
Applications  enabling technologies  fog/edge computing  Internet of Things (IoT)  security and privacy