A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures.
Mozhdeh FarhadiJean-Louis LanetGuillaume PierreDaniele MiorandiPublished in: Softw. Pract. Exp. (2020)
Keyphrases
- countermeasures
- information security
- security measures
- cyber attacks
- java card
- security issues
- security breaches
- security requirements
- intrusion detection
- information systems
- smart card
- computer security
- rural areas
- network security
- power analysis
- information warfare
- risk analysis
- smart grid
- data security
- security risks
- e government
- security mechanisms
- sensitive data
- weather conditions
- sql injection