Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL.
Shanshan TuMuhammad WaqasYuan MengSadaqat ur RehmanIftekhar AhmadAnis KoubaaZahid HalimMuhammad HanifChin-Chen ChangChengjie ShiPublished in: Comput. Commun. (2020)
Keyphrases
- user oriented
- defense mechanisms
- network security
- intrusion detection
- cyber attacks
- dos attacks
- ddos attacks
- security measures
- information security
- mobile devices
- security vulnerabilities
- user interface
- smart grid
- countermeasures
- interactive information retrieval systems
- security issues
- authentication protocol
- cyber security
- security requirements
- intrusion detection system
- database