A neutrosophic theory based security approach for fog and mobile-edge computing.
Mohamed Abdel-BassetGunasekaran ManogaranMai MohamedPublished in: Comput. Networks (2019)
Keyphrases
- mobile devices
- mobile commerce
- theoretical framework
- security policies
- mobile applications
- mobile phone
- network security
- single image
- intrusion detection
- information security
- context aware
- access control
- mobile users
- edge detection
- statistical databases
- security requirements
- fuzzy logic
- edge detector
- edge information
- communication technologies
- mobile services
- information systems