[HTML][HTML] A review on fog computing: issues, characteristics, challenges, and potential applications

R Das, MM Inuwa - Telematics and Informatics Reports, 2023 - Elsevier
Fog computing is a paradigm that utilizes the advantages of both the cloud and the edge
devices providing quality services, reducing latency, providing mobility support, multi …

Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions

S Ahmad, I Shakeel, S Mehfuz, J Ahmad - Computer Science Review, 2023 - Elsevier
In recent times, the machine learning (ML) community has recognized the deep learning
(DL) computing model as the Gold Standard. DL has gradually become the most widely …

Security and privacy in fog computing: Challenges

M Mukherjee, R Matam, L Shu, L Maglaras… - IEEE …, 2017 - ieeexplore.ieee.org
Fog computing paradigm extends the storage, networking, and computing facilities of the
cloud computing toward the edge of the networks while offloading the cloud data centers …

Underwater Internet of Things in smart ocean: System architecture and open issues

T Qiu, Z Zhao, T Zhang, C Chen… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
The development of the smart ocean requires that various features of the ocean be explored
and understood. The Underwater Internet of Things (UIoT), an extension of the Internet of …

Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments

H Mahalingam, P Velupillai Meikandan, K Thenmozhi… - Mathematics, 2023 - mdpi.com
Cloud services offer doctors and data scientists access to medical data from multiple
locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore …

The Internet of Things: A review of enabled technologies and future challenges

IU Din, M Guizani, S Hassan, BS Kim, MK Khan… - Ieee …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging classical model, envisioned as a system of
billions of small interconnected devices for posing the state-of-the-art findings to real-world …

A survey on secure data analytics in edge computing

D Liu, Z Yan, W Ding… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection

A Mourad, H Tout, OA Wahab, H Otrok… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Vehicles and vehicular networks have been compelling targets for malicious
security attacks where several intrusion detection solutions have been proposed for …