“Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial

被引:0
|
作者
Joanna Kołodziej
Martin Gilje Jaatun
Samee Ullah Khan
Mario Koeppen
机构
[1] Cracow University of Technology,Institute of Computer Science
[2] SINTEF ICT,Department of Software Engineering, Safety and Security
[3] North Dakota State University,Electrical & Computer Engineering Department
[4] Kyushu Institute of Technology,Network Design and Research Center
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:591 / 593
页数:2
相关论文
共 50 条
  • [31] Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing
    Huang, Binbin
    Xiang, Yuanyuan
    Yu, Dongjin
    Wang, Jiaojiao
    Li, Zhongjin
    Wang, Shangguang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [32] Security-Aware QoS Forecasting in Mobile Edge Computing based on Federated Learning
    Jin, Huiying
    Zhang, Pengcheng
    Dong, Hai
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2020), 2020, : 302 - 309
  • [33] Cost Efficient VNF Placement with Optimization Problem for Security-Aware Virtual Networks
    Dwiardhika, Dhanu
    Tachibana, Takuji
    2018 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2018,
  • [34] Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors
    Zheng, Danyang
    Liu, Xiaorong
    Tang, Wenyi
    Xu, Honghui
    Cao, Xiaojun
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2093 - 2098
  • [35] Security Threat Mitigation Trends in Low-Cost RFID Systems
    Garcia-Alfaro, Joaquin
    Barbeau, Michel
    Kranakis, Evangelos
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2010, 5939 : 193 - 207
  • [36] Security and privacy on low-cost radio frequency identification systems
    Sun L.
    International Journal of Security and Networks, 2010, 5 (2-3) : 128 - 134
  • [37] Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems
    Zhang, Aiqing
    Wang, Lei
    Ye, Xinrong
    Lin, Xiaodong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 662 - 675
  • [38] Security-aware intermediate data placement strategy in scientific cloud workflows
    Liu, Wei
    Peng, Su
    Du, Wei
    Wang, Wei
    Zeng, Guo Sun
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (02) : 423 - 447
  • [39] Security-aware intermediate data placement strategy in scientific cloud workflows
    Wei Liu
    Su Peng
    Wei Du
    Wei Wang
    Guo Sun Zeng
    Knowledge and Information Systems, 2014, 41 : 423 - 447
  • [40] Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems
    Genge, Bela
    Haller, Piroska
    Duka, Adrian-Vasile
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 206 - 222