共 50 条
- [21] TACRM: trust access control and resource management mechanism in fog computing [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01):
- [23] An Efficient Impersonation Attack Detection Method in Fog Computing [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 267 - 281
- [25] Efficient caching method in fog computing for internet of everything [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 439 - 452
- [28] An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria [J]. Computing, 2022, 104 : 1643 - 1675
- [29] An IoT Management System Using Fog Computing [J]. 2021 EIGHTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2021, : 146 - 153
- [30] An Invocation Chain Test and Evaluation Method for Fog Computing [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020