Login / Signup
A neutrosophic AHP-based computational technique for security management in a fog computing network.
Jasleen Kaur
Rajeev Kumar
Alka Agrawal
Raees Ahmad Khan
Published in:
J. Supercomput. (2023)
Keyphrases
</>
security management
security measures
network security
wireless sensor networks
computer networks
multi tier
databases
peer to peer
network management
data processing
network traffic
security issues