共 50 条
- [1] Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (02): : 2015 - 2027
- [2] Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack [J]. IEEE ACCESS, 2018, 6 : 74993 - 75001
- [3] Impersonation Attack Detection in IoT Networks [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6061 - 6066
- [4] A Hierarchical Fog Computing Framework for Network Attack Detection in SDN [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 4366 - 4371
- [5] A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing [J]. 9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 : 24 - 31
- [6] IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction [J]. IEEE ACCESS, 2020, 8 : 65520 - 65529
- [7] Impersonation Attack Detection in Mobile Edge Computing by Levering SARSA Technique in Physical Layer Security [J]. APPLIED SCIENCES-BASEL, 2022, 12 (20):
- [8] Enhancing Security in VANETs with Sybil Attack Detection using Fog Computing [J]. 2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
- [10] Efficient caching method in fog computing for internet of everything [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 439 - 452