V Prokhorenko, MA Babar - IEEE Access, 2020 - ieeexplore.ieee.org
An increasing number of large-scale distributed systems are being built by incorporating Cloud, Fog, and Edge computing. There is an important need of understanding how to …
This paper focuses on the security challenges of network slice implementation in 5G networks. We propose that network slice controllers support security by enabling security …
M Jena, U Das, M Das - Predictive Data Security using AI: Insights and …, 2022 - Springer
With the emergence of Fog and Edge architecture, optimization has become a significant aspect of Cloud computing. Not only do these changing architecture necessitate re …
MR Namjoo, A Keramati, SA Torabi… - International Journal of …, 2018 - igi-global.com
Composite services are regarded as essential components of a cloud-based manufacturing (CM) system. Different classes of disruptive events which are rooted in the uncertainties of …
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is …