Identification of malicious edge devices in fog computing environments.
Rajinder SandhuAmandeep Singh SohalSandeep K. SoodPublished in: Inf. Secur. J. A Glob. Perspect. (2017)
Keyphrases
- computing environments
- grid computing
- mobile computing
- wireless devices
- mobile agents
- service discovery
- mobile environments
- single image
- low bandwidth
- pervasive computing
- pervasive computing environments
- artificial intelligence
- trusted computing
- computing platform
- high performance computing
- context awareness
- edge information
- edge detector
- edge detection
- mobile devices
- weighted graph
- fault tolerance
- grid systems
- malicious behavior