Login / Signup
Fog computing security: A review.
Awais Khan Jumani
Jinglun Shi
Asif Ali Laghari
Zhihui Hu
Aftab ul Nabi
Huang Qian
Published in:
Secur. Priv. (2023)
Keyphrases
</>
information security
access control
information assurance
security problems
intrusion detection
single image
security issues
security mechanisms
statistical databases
data security
key management
neural network
functional requirements
real time
security protocols
network security
database systems