Fog computing network security based on resources management.
Wided Ben DaoudSalwa OthmenMonia HamdiRadhia KhdhirHabib HamamPublished in: EURASIP J. Wirel. Commun. Netw. (2023)
Keyphrases
- network security
- computer networks
- digital economy
- intrusion detection
- traffic analysis
- network monitoring
- intrusion detection system
- network traffic
- information security
- dos attacks
- information systems
- anomaly detection
- network access
- risk assessment
- network management
- security policies
- network administrators
- ip networks
- network intrusion
- security breaches
- anti phishing
- situation assessment
- knowledge management
- security protection
- denial of service
- decision support
- situation awareness
- cyber security
- data management