UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system Journal article
Guangxue Zhang, Tian Wang, Guojun Wang, Anfeng Liu, Weijia Jia. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7).
Authors:  Guangxue Zhang;  Tian Wang;  Guojun Wang;  Anfeng Liu;  Weijia Jia
Favorite | TC[WOS]:67 TC[Scopus]:63  IF:1.5/1.5 | Submit date:2021/12/07
Fog Computing  Hidden Data Attacks  Internal Attacks  Sensor-cloud  Trust Evaluation Mechanism  
A novel trust mechanism based on Fog Computing in Sensor–Cloud System Journal article
Wang, Tian, Zhang, Guangxue, Bhuiyan, MD Zakirul Alam, Liu, Anfeng, Jia, Weijia, Xie, Mande. A novel trust mechanism based on Fog Computing in Sensor–Cloud System[J]. Future Generation Computer Systems, 2020, 109, 573-582.
Authors:  Wang, Tian;  Zhang, Guangxue;  Bhuiyan, MD Zakirul Alam;  Liu, Anfeng;  Jia, Weijia; et al.
Favorite | TC[WOS]:113 TC[Scopus]:114  IF:6.2/5.9 | Submit date:2021/12/06
Edge Node  Fog Computing  Misjudgment Node  Sensor–cloud  Trust Mechanism