Articles with "fog networks" as a keyword



Photo by jordanharrison from unsplash

Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2017.2685596

Abstract: While the Internet of Things (IoT) is making our lives much easier, managing the IoT becomes a big issue due to the huge number of connections, and the lack of protections for devices. Recent work… read more here.

Keywords: sdn infrastructure; securing sdn; fog networks; iot fog ... See more keywords
Photo from wikipedia

Online Partial Offloading and Task Scheduling in SDN-Fog Networks With Deep Recurrent Reinforcement Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3130474

Abstract: Smart industries enabling automation and data exchange in manufacturing technologies demanding real-time processing, nearby storage, and reliability, all of which can be satisfied by the fog computing architecture. With the emergence of smart devices coupled… read more here.

Keywords: deep recurrent; fog networks; network; online partial ... See more keywords
Photo by mbrunacr from unsplash

Joint Computation Offloading and Scheduling Optimization of IoT Applications in Fog Networks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Network Science and Engineering"

DOI: 10.1109/tnse.2020.3021792

Abstract: In recent times, fog computing becomes an emerging technology that can exhilarate the cloud services towards the network edge for increasing the speeds up of various Internet-of-Things (IoT) applications. In this context, integrating priority-aware scheduling… read more here.

Keywords: iot applications; optimization; energy; joint computation ... See more keywords
Photo by faturnurf from unsplash

Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2018.2831197

Abstract: Phishing detection is recognized as a criminal issue of Internet security. By deploying a gateway anti-phishing in the networks, these current hardware-based approaches provide an additional layer of defense against phishing attacks. However, such hardware… read more here.

Keywords: neuro fuzzy; phishing attacks; fog networks; anti phishing ... See more keywords
Photo by davidvives from unsplash

Proactive edge computing in fog networks with latency and reliability guarantees

Sign Up to like & get
recommendations!
Published in 2018 at "EURASIP Journal on Wireless Communications and Networking"

DOI: 10.1186/s13638-018-1218-y

Abstract: This paper studies the problem of task distribution and proactive edge caching in fog networks with latency and reliability constraints. In the proposed approach, user nodes (UNs) offload their computing tasks to edge computing servers… read more here.

Keywords: proactive edge; latency reliability; networks latency; edge computing ... See more keywords