Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fog computing
biblio
Fog Computing as a Defensive Approach Against Distributed Denial of Service (DDoS): A Proposed Architecture
Submitted by grigby1 on Fri, 10/26/2018 - 4:47pm
captchas
Cloud Computing
computer architecture
Computer crime
DDoS
edge computing
Fog computing
Fog defense
Fog defense architecture
IP networks
IP spoofing
biblio
DDoS attack defense framework for cloud using fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:47pm
Cloud Computing
Computer crime
computer network security
DDoS
DDoS attack defense framework
DDoS attack traffic
Decision Making
edge computing
Fog computing
fog defender
IP networks
Market research
Servers
telecommunication traffic
tools
biblio
Security issues in fog computing using vehicular cloud
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Scalability
Vehicular cloud
vehicular ad hoc networks
VANET Cloud
VANET
V2V
V2I
Traffic Safety
security issues
security
authentication
Resiliency
pubcrawl
I2V
Fog computing
edge computing
delays
data privacy
computer architecture
Cloud Computing
biblio
Data security storage model for fog computing in large-scale IoT application
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
for fog computing
storage resources
storage management
security of data
security management
security
Scalability
Resiliency
pubcrawl
large-scale IoT application
IoT application
Internet of Things
geographical distributed storage system
Big Data
fog computing system
fog computing nodes
Fog Computing and Security
Fog computing
FCS
FCDSSM
distributed processing
data synchronization
data security storage model
Cloud Computing
big data security storage
biblio
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Fog computing
telecommunication security
Servers
security system
security service
security places
security
Scalability
Resiliency
pubcrawl
latency problems
latency issues
fog-computing requirements
fog servers
Fog Computing and Security
authentication
entry point
end devices
efficient mutual authentication scheme
edge resources
edge devices
edge computing
Cryptography
Cryptographic Protocols
computer architecture
cloud computing services
Cloud Computing
Authentication schemes
Authentication Protocols
biblio
Privacy-preserving fog computing paradigm
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Privacy in Fog
Software Architecture
security of data
security assessment
security
Scalability
Resiliency
pubcrawl
privacy-preserving fog computing paradigm
Privacy Threats
Cloud Computing
privacy
IoT
Intelligent sensors
fog nodes
fog computing architecture
Fog computing
edge computing
data privacy
computer architecture
biblio
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
mobile computing
healthcare facilities
healthcare information system environment
high-profile attacks
medical control systems
medical data
medical devices
medical information systems
Medical services
healthcare cloud-lets
mobile services
Protocols
pubcrawl
Resiliency
Scalability
security
security of data
Service Provisioning
edge computing
autonomic zero-knowledge security provisioning model
AZSPM
Cloud Computing
cloud-based solutions
cloud-hoarding
Computational modeling
cyber security
different healthcare enterprises
atomic security components
Fog computing
FOG computing environment
fog environments
fog security administration
fully sand boxed environment
health care
health informatics industry
Health Information Systems
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
optimal datacenter
Trust models
Time factors
Service Broker
security-based service broker policy
security strength
security risks
security of data
security
Scalability
SbSBP
resource allocation
Resiliency
quantized security
pubcrawl
personal computers
available service providers
online Internet of Things services
load balancing
Internet of Things
Indexes
Heuristic algorithms
FOG computing environment
Fog computing
enhanced heterogeneity
edge computing
decision-making process
Decision Making
computing servers
computer centres
Computational modeling
Cloud Computing
biblio
Secure the internet of things with challenge response authentication in fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog computing based security system
VPN server
Virtual private networks
virtual private network
Servers
security of data
security
IoT system
IoT devices
Internet of Things
authentication
Fog computing
FOCUS system
edge computing
distributed denial of service attacks
DDoS Attacks
computer network security
Computer crime
Cloud Computing
challenge-response authentication
biblio
A data protection model for fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog-based privacy-aware role based access control
security of data
security
Scalability
Resiliency
region-based trust-aware model
RBTA model
pubcrawl
Mobility
IoT
Internet of Things
FPRBAC
Access Control
fog security
fog location
Fog computing
edge computing
Data Security
data protection model
Data protection
Data models
Computational modeling
Cloud Computing
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »