A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing.
Shailendra RathorePradip Kumar SharmaArun Kumar SangaiahJames J. ParkPublished in: IEEE Access (2018)
Keyphrases
- fuzzy linguistic
- fuzzy sets
- mobile devices
- fuzzy logic
- mobile commerce
- intrusion detection
- information security
- group decision making
- security issues
- edge detection
- edge information
- mobile payment
- statistical databases
- security policies
- fuzzy numbers
- mobile phone
- fuzzy clustering
- access control
- mobile users
- mobile computing
- fuzzy information
- mobile environments
- decision making
- fuzzy if then rules
- fuzzy classification
- edge detector
- mobile services
- fuzzy controller
- mobile networks
- network security
- mobile applications
- weighted graph