[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … Testo disponibile al sito: https://www …, 2022 - europeanleadershipnetwork.org
… Fei’s research interests focus on regional security issues in East Asia with a special
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… The security and privacy issues survey in detail. The edge/fog computing integration with
IoT is also explained in this survey paper. Yang et al. [7] 2017 The paper has done a …

Survey on trust evaluation mechanism in sensor-cloud 传感云中的信任评价机制研究进展

T Wang, G Zhang, S Cai, W Jia, G Wang - 2018 - repository.um.edu.mo
… and trust evaluation mechanisms, it was found that trusttrust evaluation mechanisms, a
new fog-based trust evaluation mechanism was designed and future research directions of trust

[PDF][PDF] Addressing Security and Computation TS Challenges in IoT Using Machine 醫官Learning

BK Mohanta, U Satapathy, D Jena - researchgate.net
… To ensure the security in IoT framework design and challenges, the potential threads [5]… fog
computing, softwaredefined network, to integrate with the model to address the security issue

[PDF][PDF] 闽EasyChair Preprint

K Karuppusamy, P Madhavan - 2020 - easychair.org
… In this paper, an extensive survey about the mobile edge … Furthermore, fog computing
infrastructure enables to collect data from various different devices [2]. This can handle big data …

無線感測網路環境下基於可靠信任模型的安全性拓樸控制之設計

YT Wang - 2022 - ir.lib.ncu.edu.tw
… Furthermore, we developed a reliable trust-based topology control algorithm (RTTC) to utilize
our trust model and create a security-based network topology. Based on simulation results, …

5G 网络环境下雾计算框架的数据安全性.

缪庆兵, 孙磊, 李昆霖, 罗琳 - Journal of Chongqing …, 2022 - search.ebscohost.com
… In order to ensure data security and privacy protection in the fog computing framework,
this study introduces the blockchain distributed security mechanism for security authentication …

[HTML][HTML] 基于云或区块链的物联网: 比较调查和前进道路

RA Memon - 信息与电子工程前沿(英文), 2022 - fitee.zjujournals.com
… the challenges in the current IoT infrastructure,and a literature survey with a taxonomy of the
issues to … Fog computing and its role in the Internet of Things. . Proc 1st Edition of the MCC …

[PDF][PDF] 传感云中的信任评价机制研究进展

王田, 张广学, 蔡绍滨, 贾维嘉… - Journal on …, 2018 - infocomm-journal.com
传感云中的信任评价机制研究进展Survey on trust evaluation mechanism in sensor-cloud …
针对这些问题,本文研究团队提出了基于雾计 算(fog computing)的传感云信任评价机制.在传 感云…

雾计算中细粒度属性更新的外包计算访问控制方案

杜瑞忠, 闫沛文, 刘妍 - 通信学报, 2021 - infocomm-journal.com
… Abstract: To slove the problem that in the fog computing … (CP-ABE) faced the problems of
high encryption and decryption … outsourcing computing access control scheme in fog computing