Sign in

A neutrosophic AHP-based computational technique for security management in a fog computing network.

Jasleen KaurRajeev KumarAlka AgrawalRaees Ahmad Khan
Published in: J. Supercomput. (2023)
Keyphrases
  • security management
  • security measures
  • network security
  • wireless sensor networks
  • computer networks
  • multi tier
  • databases
  • peer to peer
  • network management
  • data processing
  • network traffic
  • security issues