Identifying cyber threats to mobile-IoT applications in edge computing paradigm.
Jemal H. AbawajyMd. Shamsul HudaShaila SharmeenMohammad Mehedi HassanAhmad AlmogrenPublished in: Future Gener. Comput. Syst. (2018)
Keyphrases
- computing paradigm
- mobile computing
- cyber security
- mobile devices
- mobile users
- cloud computing
- pervasive computing
- context aware
- wireless networks
- ubiquitous computing
- computing paradigms
- data management
- wireless communication
- service provisioning
- cyber crime
- data collection
- distributed systems
- computing environments
- mobile agents
- intrusion detection
- mobile phone
- cyber attacks
- mobile applications
- mobile technologies
- security issues
- grid computing
- ambient intelligence
- management system
- data analysis
- load balancing