Defense scheme against advanced persistent threats in mobile fog computing security.
Muhammad WaqasShanshan TuJialin WanTalha MirHisham AlasmaryGhulam AbbasPublished in: Comput. Networks (2023)
Keyphrases
- network security
- information security
- intrusion detection
- cyber security
- security breaches
- security issues
- security threats
- cyber defense
- security vulnerabilities
- computer security
- cyber attacks
- denial of service attacks
- security services
- security measures
- cache invalidation
- digital signature scheme
- critical infrastructure
- intrusion detection system
- computer networks
- mobile commerce
- access control
- security analysis
- mobile devices
- mobile phone
- security risks
- provably secure
- defense mechanisms
- weather conditions
- security policies
- privacy issues
- countermeasures
- authentication protocol
- key management
- smart grid
- smart card
- mobile computing
- security mechanisms
- remote server
- identity theft
- elliptic curve
- security model
- key distribution
- authentication scheme
- national security