TY - STD TI - Sagiroglu S, Sinanc D (2013) Big data: A review In: Collaboration Technologies and Systems (CTS), 2013 International Conference On, 42–47.. IEEE. ID - ref1 ER - TY - STD TI - Cisco (2015) Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. Online: https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-solutions.pdf. Accessed 13 Dec 2016. UR - https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-solutions.pdf ID - ref2 ER - TY - STD TI - Tang B, Chen Z, Hefferman G, Wei T, He H, Yang Q (2015) A hierarchical distributed fog computing architecture for big data analysis in smart cities In: Proceedings of the ASE BigData & SocialInformatics 2015, 28.. ACM. ID - ref3 ER - TY - JOUR AU - Marston, S. AU - Li, Z. AU - Bandyopadhyay, S. AU - Zhang, J. AU - Ghalsasi, A. PY - 2011 DA - 2011// TI - Cloud computing-the business perspective JO - Decis Support Syst VL - 51 UR - https://doi.org/10.1016/j.dss.2010.12.006 DO - 10.1016/j.dss.2010.12.006 ID - Marston2011 ER - TY - JOUR AU - Parkinson, S. AU - Ward, P. AU - Wilson, K. AU - Miller, J. PY - 2017 DA - 2017// TI - Cyber threats facing autonomous and connected vehicles: future challenges JO - IEEE Trans Intell Transp Syst VL - PP UR - https://doi.org/10.1109/TITS.2017.2665968 DO - 10.1109/TITS.2017.2665968 ID - Parkinson2017 ER - TY - STD TI - Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues In: Computer Science and Information Systems (FedCSIS), 2014 Federated Conference On, 1–8.. IEEE. ID - ref6 ER - TY - STD TI - Kim JY, Schulzrinne H (2013) Cloud support for latency-sensitive telephony applications In: Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference On, vol. 1, 421–426.. IEEE. ID - ref7 ER - TY - STD TI - Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 13–16.. ACM. ID - ref8 ER - TY - JOUR AU - Sareen, P. AU - Kumar, P. PY - 2016 DA - 2016// TI - The fog computing paradigm JO - Int J Emerging Technol Eng Res VL - 4 ID - Sareen2016 ER - TY - JOUR AU - Vaquero, L. M. AU - Rodero-Merino, L. PY - 2014 DA - 2014// TI - Finding your way in the fog: Towards a comprehensive definition of fog computing JO - ACM SIGCOMM Comput Commun Rev VL - 44 UR - https://doi.org/10.1145/2677046.2677052 DO - 10.1145/2677046.2677052 ID - Vaquero2014 ER - TY - JOUR AU - Saharan, K. AU - Kumar, A. PY - 2015 DA - 2015// TI - Fog in comparison to cloud: A survey JO - Int J Comput Appl VL - 122 ID - Saharan2015 ER - TY - STD TI - Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: Principals, architectures, and applications. arXiv preprint arXiv:1601.02752. ID - ref12 ER - TY - STD TI - Mahmud R, Buyya R (2016) Fog computing: A taxonomy, survey and future directions. arXiv preprint arXiv:1611.05539. ID - ref13 ER - TY - STD TI - Cisco (2015) Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things. Online: https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-solutions.pdf. Accessed 13 Dec 2016. UR - https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-solutions.pdf ID - ref14 ER - TY - STD TI - Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P (2013) Security Patterns: Integrating security and systems engineering. Wiley. ID - ref15 ER - TY - JOUR AU - Satyanarayanan, M. PY - 2015 DA - 2015// TI - A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets JO - GetMobile: Mob Comput Commun VL - 18 ID - Satyanarayanan2015 ER - TY - JOUR AU - Zissis, D. AU - Lekkas, D. PY - 2012 DA - 2012// TI - Addressing cloud computing security issues JO - Futur Gener Comput Syst VL - 28 UR - https://doi.org/10.1016/j.future.2010.12.006 DO - 10.1016/j.future.2010.12.006 ID - Zissis2012 ER - TY - STD TI - Alliance CS (2016) The Treacherous 12 Cloud Computing Top Threats in 2016. Online: https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf. Accessed 22 Dec 2016. UR - https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf ID - ref18 ER - TY - STD TI - Stojmenovic I, Wen S, Huang X, Luan H (2015) An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience. ID - ref19 ER - TY - STD TI - Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: A survey In: International Conference on Wireless Algorithms, Systems, and Applications, 685–695.. Springer. ID - ref20 ER - TY - STD TI - Klas GI (2015) Fog computing and mobile edge cloud gain momentum open fog consortium, etsi mec and cloudlets. ID - ref21 ER - TY - STD TI - Ahmed A, Ahmed E (2016) A survey on mobile edge computing In: Intelligent Systems and Control (ISCO), 2016 10th International Conference On, 1–8.. IEEE. ID - ref22 ER - TY - STD TI - Series Q, Safety MQ.Programmable automation controller. ID - ref23 ER - TY - STD TI - Pierson RM (2016) How Does Fog Computing Differ from Edge Computing?Online: https://readwrite.com/2016/08/05/fog-computing-different-edge-computing-pl1/. Accessed 12 June 2017. UR - https://readwrite.com/2016/08/05/fog-computing-different-edge-computing-pl1/ ID - ref24 ER - TY - STD TI - Ha K, Satyanarayanan M (2015) Openstack++ for cloudlet deployment. School of Computer Science Carnegie Mellon University Pittsburgh. ID - ref25 ER - TY - STD TI - Li Y, Wang W (2013) The unheralded power of cloudlet computing in the vicinity of mobile devices In: Globecom Workshops (GC Wkshps), 2013 IEEE, 4994–4999.. IEEE. ID - ref26 ER - TY - STD TI - Jaiswal A, Thakare V, Sherekar S.Performance based analysis of cloudlet architectures in mobile cloud computing. ID - ref27 ER - TY - STD TI - Bahl V (2015) Emergence of Micro Datacenter (cloudlets/edges) for Mobile Computing. Online: https://www.microsoft.com/en-us/research/wp-content/uploads/2016/11/Micro-Data-Centers-mDCs-for-Mobile-Computing-1.pdf. Accessed 12 June 2017. UR - https://www.microsoft.com/en-us/research/wp-content/uploads/2016/11/Micro-Data-Centers-mDCs-for-Mobile-Computing-1.pdf ID - ref28 ER - TY - JOUR AU - Liang, K. AU - Zhao, L. AU - Chu, X. AU - Chen, H. -. H. PY - 2017 DA - 2017// TI - An integrated architecture for software defined and virtualized radio access networks with fog computing JO - IEEE Netw VL - 31 UR - https://doi.org/10.1109/MNET.2017.1600027NM DO - 10.1109/MNET.2017.1600027NM ID - Liang2017 ER - TY - STD TI - Clinch S, Harkes J, Friday A, Davies N, Satyanarayanan M (2012) How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users In: Pervasive Computing and Communications (PerCom), 2012 IEEE International Conference On, 122–127.. IEEE. ID - ref30 ER - TY - STD TI - Sindhu S, Mukherjee S (2011) Efficient task scheduling algorithms for cloud computing environment In: High Performance Architecture and Grid Computing, 79–83.. Springer. ID - ref31 ER - TY - JOUR AU - Satyanarayanan, M. AU - Bahl, P. AU - Caceres, R. AU - Davies, N. PY - 2009 DA - 2009// TI - The case for vm-based cloudlets in mobile computing JO - IEEE Pervasive Comput VL - 8 UR - https://doi.org/10.1109/MPRV.2009.82 DO - 10.1109/MPRV.2009.82 ID - Satyanarayanan2009 ER - TY - STD TI - University CM (2017) Elijah: Cloudlet Infrastructure for Mobile Computing. GitHub. ID - ref33 ER - TY - STD TI - Almorsy M, Grundy J, Müller I (2016) An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107. ID - ref34 ER - TY - STD TI - Younis YA, Kifayat K, Shi Q, Askwith B (2015) A new prime and probe cache side-channel attack for cloud computing In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference On, 1718–1724.. IEEE. ID - ref35 ER - TY - JOUR AU - Shahid, M. A. AU - Sharif, M. PY - 2015 DA - 2015// TI - Cloud computing security models, architectures, issues and challenges: A survey JO - Smart Comput Rev VL - 5 UR - https://doi.org/10.6029/smartcr.2015.06.010 DO - 10.6029/smartcr.2015.06.010 ID - Shahid2015 ER - TY - STD TI - Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F (2013) Improving web sites performance using edge servers in fog computing architecture In: Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium On, 320–323.. IEEE. ID - ref37 ER - TY - STD TI - Krishnan YN, Bhagwat CN, Utpat AP (2015) Fog computing-network based cloud computing In: Electronics and Communication Systems (ICECS), 2015 2nd International Conference On, 250–251.. IEEE. ID - ref38 ER - TY - STD TI - Abdullahi I, Arif S, Hassan S (2015) Ubiquitous shift with information centric network caching using fog computing In: Computational Intelligence in Information Systems, 327–335.. Springer. ID - ref39 ER - TY - JOUR AU - Su, J. AU - Lin, F. AU - Zhou, X. AU - Lu, X. PY - 2015 DA - 2015// TI - Steiner tree based optimal resource caching scheme in fog computing JO - China Commun VL - 12 UR - https://doi.org/10.1109/CC.2015.7224698 DO - 10.1109/CC.2015.7224698 ID - Su2015 ER - TY - JOUR AU - Sivasubramanian, S. AU - Pierre, G. AU - Van Steen, M. AU - Alonso, G. PY - 2007 DA - 2007// TI - Analysis of caching and replication strategies for web applications JO - IEEE Internet Comput VL - 11 UR - https://doi.org/10.1109/MIC.2007.3 DO - 10.1109/MIC.2007.3 ID - Sivasubramanian2007 ER - TY - STD TI - Halfond WG, Viegas J, Orso A (2006) A classification of sql-injection attacks and countermeasures In: Proceedings of the IEEE International Symposium on Secure Software Engineering, vol. 1, 13–15.. IEEE. ID - ref42 ER - TY - STD TI - Egele M, Kirda E, Kruegel C (2009) Mitigating drive-by download attacks: Challenges and open problems In: iNetSec 2009–Open Research Problems in Network Security, 52–62.. Springer. ID - ref43 ER - TY - STD TI - Gao L, Luan TH, Liu B, Zhou W, Yu S (2017) Fog computing and its applications in 5g In: 5G Mobile Communications, 571–593.. Springer. ID - ref44 ER - TY - STD TI - Luan TH, Gao L, Li Z, Xiang Y, Sun L (2015) Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815. ID - ref45 ER - TY - STD TI - Oueis J, Strinati EC, Barbarossa S (2015) The fog balancing: Load distribution for small cell cloud computing In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 1–6.. IEEE. ID - ref46 ER - TY - JOUR AU - Hu, Y. C. AU - Patel, M. AU - Sabella, D. AU - Sprecher, N. AU - Young, V. PY - 2015 DA - 2015// TI - Mobile edge computing-a key technology towards 5g JO - ETSI White Paper VL - 11 ID - Hu2015 ER - TY - STD TI - Desmedt Y (2011) Man-in-the-middle attack In: Encyclopedia of Cryptography and Security, 759–759.. Springer. ID - ref48 ER - TY - STD TI - Nayak GN, Samaddar SG (2010) Different flavours of man-in-the-middle attack, consequences and feasible solutions In: Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference On, vol. 5, 491–495.. IEEE. ID - ref49 ER - TY - STD TI - Nazmudeen MSH, Wan AT, Buhari SM (2016) Improved throughput for power line communication (plc) for smart meters using fog computing based data aggregation approach In: Smart Cities Conference (ISC2), 2016 IEEE International, 1–4.. IEEE. ID - ref50 ER - TY - STD TI - Yan Y, Su W (2016) A fog computing solution for advanced metering infrastructure In: Transmission and Distribution Conference and Exposition (T&D), 2016 IEEE/PES, 1–4.. IEEE. ID - ref51 ER - TY - JOUR AU - Ozdemir, S. AU - Xiao, Y. PY - 2009 DA - 2009// TI - Secure data aggregation in wireless sensor networks: A comprehensive overview JO - Comput Netw VL - 53 UR - https://doi.org/10.1016/j.comnet.2009.02.023 DO - 10.1016/j.comnet.2009.02.023 ID - Ozdemir2009 ER - TY - STD TI - Rajagopalan SR, Sankar L, Mohajer S, Poor HV (2011) Smart meter privacy: A utility-privacy framework In: Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference On, 190–195.. IEEE. ID - ref53 ER - TY - JOUR AU - McDaniel, P. AU - McLaughlin, S. PY - 2009 DA - 2009// TI - Security and privacy challenges in the smart grid JO - IEEE Secur Privacy VL - 7 UR - https://doi.org/10.1109/MSP.2009.76 DO - 10.1109/MSP.2009.76 ID - McDaniel2009 ER - TY - JOUR AU - Prieto González, L. AU - Prieto González, L. AU - Jaedicke, C. AU - Jaedicke, C. AU - Schubert, J. AU - Schubert, J. AU - Stantchev, V. AU - Stantchev, V. PY - 2016 DA - 2016// TI - Fog computing architectures for healthcare: Wireless performance and semantic opportunities JO - J Inf Commun Ethics Soc VL - 14 UR - https://doi.org/10.1108/JICES-05-2016-0014 DO - 10.1108/JICES-05-2016-0014 ID - Prieto González2016 ER - TY - JOUR AU - Stantchev, V. AU - Barnawi, A. AU - Ghulam, S. AU - Schubert, J. AU - Tamm, G. PY - 2015 DA - 2015// TI - Smart items, fog and cloud computing as enablers of servitization in healthcare JO - Sensors Transducers VL - 185 ID - Stantchev2015 ER - TY - STD TI - Shi Y, Ding G, Wang H, Roman HE, Lu S (2015) The fog computing service for healthcare In: Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015 2nd International Symposium On, 1–5.. IEEE. ID - ref57 ER - TY - STD TI - Gia TN, Jiang M, Rahmani AM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet of things: A case study on ecg feature extraction In: Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference On, 356–363.. IEEE. ID - ref58 ER - TY - STD TI - Cao Y, Hou P, Brown D, Wang J, Chen S (2015) Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing In: Proceedings of the 2015 Workshop on Mobile Big Data, 43–48.. ACM. ID - ref59 ER - TY - STD TI - Cao Y, Chen S, Hou P, Brown D (2015) Fast: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation In: Networking, Architecture and Storage (NAS), 2015 IEEE International Conference On, 2–11.. IEEE. ID - ref60 ER - TY - STD TI - Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings In: International Conference on Security and Privacy in Communication Systems, 89–106.. Springer. ID - ref61 ER - TY - JOUR AU - Ren, K. AU - Lou, W. AU - Zhang, Y. PY - 2008 DA - 2008// TI - Leds: Providing location-aware end-to-end data security in wireless sensor networks JO - IEEE Trans Mobile Comput VL - 7 UR - https://doi.org/10.1109/TMC.2007.70753 DO - 10.1109/TMC.2007.70753 ID - Ren2008 ER - TY - STD TI - Chen N, Chen Y, You Y, Ling H, Liang P, Zimmermann R (2016) Dynamic urban surveillance video stream processing using fog computing In: Multimedia Big Data (BigMM), 2016 IEEE Second International Conference On, 105–112.. IEEE. ID - ref63 ER - TY - JOUR AU - Shi, W. AU - Dustdar, S. PY - 2016 DA - 2016// TI - The promise of edge computing JO - Computer VL - 49 UR - https://doi.org/10.1109/MC.2016.145 DO - 10.1109/MC.2016.145 ID - Shi2016 ER - TY - STD TI - Do CT, Tran NH, Pham C, Alam MGR, Son JH, Hong CS (2015) A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing In: 2015 International Conference on Information Networking (ICOIN), 324–329.. IEEE. ID - ref65 ER - TY - JOUR AU - Varalakshmi, L. AU - Sudha, G. F. AU - Jaikishan, G. PY - 2014 DA - 2014// TI - A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks JO - Telecommun Syst VL - 56 UR - https://doi.org/10.1007/s11235-013-9849-0 DO - 10.1007/s11235-013-9849-0 ID - Varalakshmi2014 ER - TY - STD TI - Truong NB, Lee GM, Ghamri-Doudane Y (2015) Software defined networking-based vehicular adhoc network with fog computing In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 1202–1207.. IEEE. ID - ref67 ER - TY - STD TI - Datta SK, Bonnet C, Haerri J (2015) Fog computing architecture to enable consumer centric internet of things services In: 2015 International Symposium on Consumer Electronics (ISCE), 1–2.. IEEE. ID - ref68 ER - TY - JOUR AU - Roy, S. AU - Bose, R. AU - Sarddar, D. PY - 2015 DA - 2015// TI - A fog-based dss model for driving rule violation monitoring framework on the internet of things JO - Int J Adv Sci Technol VL - 82 UR - https://doi.org/10.14257/ijast.2015.82.03 DO - 10.14257/ijast.2015.82.03 ID - Roy2015 ER - TY - STD TI - Joshi B, Singh NK (2016) Mitigating dynamic dos attacks in mobile ad hoc network In: Colossal Data Analysis and Networking (CDAN), Symposium On, 1–7.. IEEE. ID - ref70 ER - TY - JOUR AU - Defta, L. C. AU - Iacob, N. M. PY - 2016 DA - 2016// TI - Aodv-authentication mechanism in manet JO - Calitatea VL - 17 ID - Defta2016 ER - TY - JOUR AU - Chen, R. Y. PY - 2017 DA - 2017// TI - An intelligent value stream-based approach to collaboration of food traceability cyber physical system by fog computing JO - Food Control VL - 71 UR - https://doi.org/10.1016/j.foodcont.2016.06.042 DO - 10.1016/j.foodcont.2016.06.042 ID - Chen2017 ER - TY - JOUR AU - Saqib, A. AU - Anwar, R. W. AU - Hussain, O. K. AU - Ahmad, M. AU - Ngadi, M. A. AU - Mohamad, M. M. AU - Malki, Z. AU - Noraini, C. AU - Jnr, B. A. AU - Nor, R. N. H. PY - 2015 DA - 2015// TI - Cyber security for cyber physcial systems: A trust-based approach JO - J Theor Appl Inf Technol VL - 71 ID - Saqib2015 ER - TY - STD TI - Monteiro A, Dubey H, Mahler L, Yang Q, Mankodiya K (2016) Fit a fog computing device for speech teletreatments. arXiv preprint arXiv:1605.06236. ID - ref74 ER - TY - STD TI - Orsini G, Bade D, Lamersdorf W (2015) Computing at the mobile edge: Designing elastic android applications for computation offloading In: IFIP Wireless and Mobile Networking Conference (WMNC), 2015 8th, 112–119.. IEEE. ID - ref75 ER - TY - STD TI - Heuser S, Negro M, Pendyala PK, Sadeghi AR (2016) Droidauditor: Forensic analysis of application-layer privilege escalation attacks on android. Technical report. Technical report, TU Darmstadt. ID - ref76 ER - TY - STD TI - Wei X, Gomez L, Neamtiu I, Faloutsos M (2012) Malicious android applications in the enterprise: What do they do and how do we fix it? In: Data Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference On, 251–254.. IEEE. ID - ref77 ER - TY - JOUR AU - Singh, P. AU - Tiwari, P. AU - Singh, S. PY - 2016 DA - 2016// TI - Analysis of malicious behavior of android apps JO - Procedia Comput Sci VL - 79 UR - https://doi.org/10.1016/j.procs.2016.03.028 DO - 10.1016/j.procs.2016.03.028 ID - Singh2016 ER - TY - STD TI - Zao JK, Gan TT, You CK, Méndez SJR, Chung CE, Te Wang Y, Mullen T, Jung TP (2014) Augmented brain computer interaction based on fog computing and linked data In: Intelligent Environments (IE), 2014 International Conference On, 374–377.. IEEE. ID - ref79 ER - TY - JOUR AU - Zao, J. K. AU - Gan, T. T. AU - You, C. K. AU - Chung, C. E. AU - Wang, Y. T. AU - Méndez, S. J. R. AU - Mullen, T. AU - Yu, C. AU - Kothe, C. AU - Hsiao, C. T. PY - 2014 DA - 2014// TI - Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology JO - Front Hum Neurosci VL - 8 UR - https://doi.org/10.3389/fnhum.2014.00370 DO - 10.3389/fnhum.2014.00370 ID - Zao2014 ER - TY - STD TI - Dubey H, Yang J, Constant N, Amiri AM, Yang Q, Makodiya K (2015) Fog data: enhancing telehealth big data through fog computing In: Proceedings of the ASE BigData & SocialInformatics 2015, 14.. ACM. ID - ref81 ER - TY - STD TI - Ha DA, Nguyen KT, Zao JK (2016) Efficient authentication of resource-constrained iot devices based on ecqv implicit certificates and datagram transport layer security protocol In: Proceedings of the Seventh Symposium on Information and Communication Technology, 173–179.. ACM. ID - ref82 ER - TY - STD TI - Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for iot In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 687–694.. IEEE. ID - ref83 ER - TY - JOUR AU - Dastjerdi, A. V. AU - Buyya, R. PY - 2016 DA - 2016// TI - Fog computing: Helping the internet of things realize its potential JO - Computer VL - 49 UR - https://doi.org/10.1109/MC.2016.245 DO - 10.1109/MC.2016.245 ID - Dastjerdi2016 ER - TY - JOUR AU - Mao, Y. AU - Li, J. AU - Chen, M. R. AU - Liu, J. AU - Xie, C. AU - Zhan, Y. PY - 2016 DA - 2016// TI - Fully secure fuzzy identity-based encryption for secure iot communications JO - Comput Standards Interfaces VL - 44 UR - https://doi.org/10.1016/j.csi.2015.06.007 DO - 10.1016/j.csi.2015.06.007 ID - Mao2016 ER - TY - JOUR AU - Ferraiolo, D. F. AU - Sandhu, R. AU - Gavrila, S. AU - Kuhn, D. R. AU - Chandramouli, R. PY - 2001 DA - 2001// TI - Proposed nist standard for role-based access control JO - ACM Trans Inf Syst Security (TISSEC) VL - 4 UR - https://doi.org/10.1145/501978.501980 DO - 10.1145/501978.501980 ID - Ferraiolo2001 ER - TY - JOUR AU - Jalali, F. AU - Hinton, K. AU - Ayre, R. AU - Alpcan, T. AU - Tucker, R. S. PY - 2016 DA - 2016// TI - Fog computing may help to save energy in cloud computing JO - IEEE J Selected Areas Commun VL - 34 UR - https://doi.org/10.1109/JSAC.2016.2545559 DO - 10.1109/JSAC.2016.2545559 ID - Jalali2016 ER - TY - STD TI - Deng R, Lu R, Lai C, Luan TH (2015) Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing In: 2015 IEEE International Conference on Communications (ICC), 3909–3914.. IEEE. ID - ref88 ER - TY - STD TI - Di Lorenzo P, Barbarossa S, Sardellitti S (2013) Joint optimization of radio resources and code partitioning in mobile edge computing. arXiv preprint arXiv:1307.3835. ID - ref89 ER - TY - JOUR AU - Chang, V. AU - Ramachandran, M. PY - 2016 DA - 2016// TI - Towards achieving data security with the cloud computing adoption framework JO - IEEE Trans Serv Comput VL - 9 UR - https://doi.org/10.1109/TSC.2015.2491281 DO - 10.1109/TSC.2015.2491281 ID - Chang2016 ER - TY - STD TI - Jayanth HC (2014) A fog computing architecture for disaster response networks. PhD thesis, Texas A&M University. ID - ref91 ER - TY - JOUR AU - Satyanarayanan, M. AU - Lewis, G. AU - Morris, E. AU - Simanta, S. AU - Boleng, J. AU - Ha, K. PY - 2013 DA - 2013// TI - The role of cloudlets in hostile environments JO - IEEE Pervasive Comput VL - 12 UR - https://doi.org/10.1109/MPRV.2013.77 DO - 10.1109/MPRV.2013.77 ID - Satyanarayanan2013 ER - TY - STD TI - Lewis G, Echeverría S, Simanta S, Bradshaw B, Root J (2014) Tactical cloudlets: Moving cloud computing to the edge In: Military Communications Conference (MILCOM), 2014 IEEE, 1440–1446.. IEEE. ID - ref93 ER - TY - JOUR AU - Ochang, P. A. AU - Irving, P. PY - 2016 DA - 2016// TI - Performance analysis of wireless network throughput and security protocol integration JO - Int J Future Generation Commun Netw VL - 9 UR - https://doi.org/10.14257/ijfgcn.2016.9.1.07 DO - 10.14257/ijfgcn.2016.9.1.07 ID - Ochang2016 ER - TY - STD TI - Kulkarni S, Saha S, Hockenbury R (2014) Preserving privacy in sensor-fog networks In: Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference For, 96–99.. IEEE. ID - ref95 ER - TY - STD TI - Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: Mitigating insider data theft attacks in the cloud In: Security and Privacy Workshops (SPW), 2012 IEEE Symposium On, 125–128.. IEEE. ID - ref96 ER - TY - JOUR AU - Vaux, D. L. AU - Fidler, F. AU - Cumming, G. PY - 2012 DA - 2012// TI - Replicates and repeats-what is the difference and is it significant? JO - EMBO Reports VL - 13 UR - https://doi.org/10.1038/embor.2012.36 DO - 10.1038/embor.2012.36 ID - Vaux2012 ER - TY - STD TI - Sudha I, Kannaki A, Jeevidha S (2014) Alleviating internal data theft attacks by decoy technology in cloud. IJCSMC, March. ID - ref98 ER - TY - JOUR AU - Dong, M. T. AU - Zhou, X. PY - 2016 DA - 2016// TI - Fog computing: Comprehensive approach for security data theft attack using elliptic curve cryptography and decoy technology JO - Open Access Library J VL - 3 ID - Dong2016 ER - TY - STD TI - Dsouza C, Ahn GJ, Taguinod M (2014) Policy-driven security management for fog computing: Preliminary framework and a case study In: Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference On, 16–23.. IEEE. ID - ref100 ER - TY - JOUR AU - Mirkovic, J. AU - Reiher, P. PY - 2004 DA - 2004// TI - A taxonomy of ddos attack and ddos defense mechanisms JO - ACM SIGCOMM Comput Commun Rev VL - 34 UR - https://doi.org/10.1145/997150.997156 DO - 10.1145/997150.997156 ID - Mirkovic2004 ER - TY - STD TI - Shtern M, Sandel R, Litoiu M, Bachalo C, Theodorou V (2014) Towards mitigation of low and slow application ddos attacks In: Cloud Engineering (IC2E), 2014 IEEE International Conference On, 604–609.. IEEE. ID - ref102 ER - TY - STD TI - Gentry C (2009) Fully homomorphic encryption using ideal lattices In: STOC, vol. 9, 169–178.. ACM. ID - ref103 ER - TY - STD TI - Bos JW, Castryck W, Iliashenko I, Vercauteren F (2017) Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling In: International Conference on Cryptology in Africa, 184–201.. Springer. ID - ref104 ER - TY - JOUR AU - Lu, R. AU - Liang, X. AU - Li, X. AU - Lin, X. AU - Shen, X. PY - 2012 DA - 2012// TI - Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications JO - IEEE Trans Parallel Distributed Syst VL - 23 UR - https://doi.org/10.1109/TPDS.2012.86 DO - 10.1109/TPDS.2012.86 ID - Lu2012 ER - TY - JOUR AU - Vishwanath, A. AU - Peruri, R. AU - He, J. S. PY - 2016 DA - 2016// TI - Security in fog computing through encryption JO - Int J Inf Technol Comput Sci (IJITCS) VL - 8 ID - Vishwanath2016 ER - TY - JOUR AU - Mahajan, P. AU - Sachdeva, A. PY - 2013 DA - 2013// TI - A study of encryption algorithms aes, des and rsa for security JO - Global J Comput Sci Technol VL - 13 ID - Mahajan2013 ER - TY - JOUR AU - Shmueli, E. AU - Vaisenberg, R. AU - Elovici, Y. AU - Glezer, C. PY - 2010 DA - 2010// TI - Database encryption: an overview of contemporary challenges and design considerations JO - ACM SIGMOD Record VL - 38 UR - https://doi.org/10.1145/1815933.1815940 DO - 10.1145/1815933.1815940 ID - Shmueli2010 ER - TY - CHAP AU - Varriale, A. AU - Prinetto, P. AU - Carelli, A. AU - Trotta, P. PY - 2016 DA - 2016// TI - SEcube (TM): Data at rest and data in motion protection BT - Proceedings of the International Conference on Security and Management (SAM) PB - The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) CY - Athens ID - Varriale2016 ER - TY - STD TI - Hussein NH, Khalid A, Khanfar K (2016) A survey of cryptography cloud storage techniques. ID - ref110 ER - TY - STD TI - Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing In: European Symposium on Research in Computer Security, 355–370.. Springer. ID - ref111 ER - TY - JOUR AU - Page, D. PY - 2003 DA - 2003// TI - Defending against cache-based side-channel attacks JO - Inf Security Technical Rep VL - 8 UR - https://doi.org/10.1016/S1363-4127(03)00104-3 DO - 10.1016/S1363-4127(03)00104-3 ID - Page2003 ER - TY - STD TI - Acıiçmez O, Koç Ç,K (2006) Trace-driven cache attacks on aes (short paper) In: International Conference on Information and Communications Security, 112–121.. Springer. ID - ref113 ER - TY - STD TI - Liu F, Lee RB (2013) Security testing of a secure cache design In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 3.. ACM. ID - ref114 ER - TY - STD TI - Kim T, Peinado M, Mainar-Ruiz G (2012) STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud In: USENIX Security Symposium, 189–204.. Usenix. ID - ref115 ER - TY - STD TI - Kong J, Aciicmez O, Seifert JP, Zhou H (2008) Deconstructing new cache designs for thwarting software cache-based side channel attacks In: Proceedings of the 2nd ACM Workshop on Computer Security Architectures, 25–34.. ACM. ID - ref116 ER - TY - JOUR AU - Hu, F. AU - Hao, Q. AU - Bao, K. PY - 2014 DA - 2014// TI - A survey on software-defined network and openflow: From concept to implementation JO - IEEE Commun Surv Tutorials VL - 16 UR - https://doi.org/10.1109/COMST.2014.2326417 DO - 10.1109/COMST.2014.2326417 ID - Hu2014 ER - TY - STD TI - Shin S, Gu G (2012) Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) In: Network Protocols (ICNP), 2012 20th IEEE International Conference On, 1–6.. IEEE. ID - ref118 ER - TY - STD TI - Chowdhury SR, Bari MF, Ahmed R, Boutaba R (2014) Payless: A low cost network monitoring framework for software defined networks In: Network Operations and Management Symposium (NOMS), 2014 IEEE, 1–9.. IEEE. ID - ref119 ER - TY - JOUR AU - Aceto, G. AU - Botta, A. AU - De Donato, W. AU - Pescapè, A. PY - 2013 DA - 2013// TI - Cloud monitoring: A survey JO - Comput Netw VL - 57 UR - https://doi.org/10.1016/j.comnet.2013.04.001 DO - 10.1016/j.comnet.2013.04.001 ID - Aceto2013 ER - TY - JOUR AU - Ab Rahman, N. H. AU - Choo, K. -. K. R. PY - 2015 DA - 2015// TI - A survey of information security incident handling in the cloud JO - Comput Secur VL - 49 UR - https://doi.org/10.1016/j.cose.2014.11.006 DO - 10.1016/j.cose.2014.11.006 ID - Ab Rahman2015 ER - TY - JOUR AU - Liu, J. AU - Liu, F. AU - Ansari, N. PY - 2014 DA - 2014// TI - Monitoring and analyzing big traffic data of a large-scale cellular network with hadoop JO - IEEE Netw VL - 28 UR - https://doi.org/10.1109/MNET.2014.6863129 DO - 10.1109/MNET.2014.6863129 ID - Liu2014 ER - TY - JOUR AU - Sawant, M. D. AU - Phatak, M. M. AU - Ranavde, M. A. AU - Laxamanan, N. R. PY - 2015 DA - 2015// TI - Intelligent firewall using intrusion detection system based on neural networks JO - J Netw Inf Security VL - 2 ID - Sawant2015 ER - TY - JOUR AU - Hatem, S. S. AU - El-Khouly, M. M. PY - 2014 DA - 2014// TI - Malware detection in cloud computing JO - Int J Adv Comput Sci Appl VL - 5 ID - Hatem2014 ER - TY - JOUR AU - Malhotra, A. AU - Bajaj, K. PY - 2016 DA - 2016// TI - A survey on various malware detection techniques on mobile platform JO - Int J Comput Appl VL - 139 ID - Malhotra2016 ER - TY - STD TI - Demme J, Maycock M, Schmitz J, Tang A, Waksman A, Sethumadhavan S, Stolfo S (2013) On the feasibility of online malware detection with performance counters In: ACM SIGARCH Computer Architecture News, vol. 41, 559–570.. ACM. ID - ref126 ER - TY - CHAP AU - Kirat, D. AU - Vigna, G. AU - Kruegel, C. PY - 2014 DA - 2014// TI - Barecloud: Bare-metal analysis-based evasive malware detection BT - USENIX Security PB - Usenix CY - University of California, Santa Barbara ID - Kirat2014 ER - TY - STD TI - Comar PM, Liu L, Saha S, Tan PN, Nucci A (2013) Combining supervised and unsupervised learning for zero-day malware detection In: INFOCOM, 2013 Proceedings IEEE, 2022–2030.. IEEE. ID - ref128 ER - TY - STD TI - Berlin K, Saxe J (2016) Improving zero-day malware testing methodology using statistically significant time-lagged test samples. arXiv preprint arXiv:1608.00669. ID - ref129 ER - TY - STD TI - Zolotukhin M, Hamalainen T (2014) Detection of zero-day malware based on the analysis of opcode sequences In: Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th, 386–391.. IEEE. ID - ref130 ER - TY - JOUR AU - Embleton, S. AU - Sparks, S. AU - Zou, C. C. PY - 2013 DA - 2013// TI - Smm rootkit: a new breed of os independent malware JO - Secur Commun Netw VL - 6 UR - https://doi.org/10.1002/sec.166 DO - 10.1002/sec.166 ID - Embleton2013 ER - TY - STD TI - Aazam M, Huh EN (2014) Fog computing and smart gateway based communication for cloud of things In: Future Internet of Things and Cloud (FiCloud), 2014 International Conference On, 464–470.. IEEE. ID - ref132 ER - TY - JOUR AU - Al Ameen, M. AU - Liu, J. AU - Kwak, K. PY - 2012 DA - 2012// TI - Security and privacy issues in wireless sensor networks for healthcare applications JO - J Med Syst VL - 36 UR - https://doi.org/10.1007/s10916-010-9449-4 DO - 10.1007/s10916-010-9449-4 ID - Al Ameen2012 ER - TY - STD TI - Pathan A-SK, Lee HW, Hong CS (2006) Security in wireless sensor networks: issues and challenges In: Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol. 2, 6.. IEEE. ID - ref134 ER - TY - JOUR AU - Gai, K. AU - Qiu, M. AU - Tao, L. AU - Zhu, Y. PY - 2015 DA - 2015// TI - Intrusion detection techniques for mobile cloud computing in heterogeneous 5g JO - Secur Commun Netw VL - 10 ID - Gai2015 ER - TY - JOUR AU - Mokhtar, B. AU - Azab, M. PY - 2015 DA - 2015// TI - Survey on security issues in vehicular ad hoc networks JO - Alexandria Eng J VL - 54 UR - https://doi.org/10.1016/j.aej.2015.07.011 DO - 10.1016/j.aej.2015.07.011 ID - Mokhtar2015 ER - TY - STD TI - Razzaque M, Salehi A, Cheraghi SM (2013) Security and privacy in vehicular ad-hoc networks: survey and the road ahead In: Wireless Networks and Security, 107–132.. Springer. ID - ref137 ER - TY - JOUR AU - Rawat, D. B. AU - Yan, G. AU - Bista, B. B. AU - Weigle, M. C. PY - 2015 DA - 2015// TI - Trust on the security of wireless vehicular ad-hoc networking JO - Ad Hoc Sensor Wireless Netw VL - 24 ID - Rawat2015 ER - TY - STD TI - Boumerdassi S, Renault É, Muhlethaler P (2016) A stateless time-based authenticated-message protocol for wireless sensor networks (stamp) In: Wireless Communications and Networking Conference (WCNC), 2016 IEEE, 1–6.. IEEE. ID - ref139 ER - TY - STD TI - Bezemer CP, Zaidman A (2010) Multi-tenant saas applications: maintenance dream or nightmare? In: Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), 88–92.. ACM. ID - ref140 ER - TY - STD TI - AlJahdali H, Albatli A, Garraghan P, Townend P, Lau L, Xu J (2014) Multi-tenancy in cloud computing In: Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium On, 344–351.. IEEE. ID - ref141 ER - TY - JOUR AU - Fernandes, D. A. AU - Soares, L. F. AU - Gomes, J. V. AU - Freire, M. M. AU - Inácio, P. R. PY - 2014 DA - 2014// TI - Security issues in cloud environments: a survey JO - Int J Inf Secur VL - 13 UR - https://doi.org/10.1007/s10207-013-0208-7 DO - 10.1007/s10207-013-0208-7 ID - Fernandes2014 ER - TY - STD TI - Chung CJ, Xing T, Huang D, Medhi D, Trivedi K (2015) Serene: on establishing secure and resilient networking services for an sdn-based multi-tenant datacenter environment In: Dependable Systems and Networks Workshops (DSN-W), 2015 IEEE International Conference On, 4–11.. IEEE. ID - ref143 ER - TY - JOUR AU - Wood, T. AU - Cecchet, E. AU - Ramakrishnan, K. K. AU - Shenoy, P. J. AU - van der Merwe, J. E. AU - Venkataramani, A. PY - 2010 DA - 2010// TI - Disaster recovery as a cloud service: Economic benefits & deployment challenges JO - HotCloud VL - 10 ID - Wood2010 ER - TY - STD TI - DuBois L, Amatruda R (2010) Backup and recovery: Accelerating efficiency and driving down it costs using data deduplication. EMC Corporation. ID - ref145 ER - TY - STD TI - Suguna S, Suhasini A (2014) Overview of data backup and disaster recovery in cloud In: Information Communication and Embedded Systems (ICICES), 2014 International Conference On, 1–7.. IEEE. ID - ref146 ER - TY - STD TI - Son Y, Choi J, Jeon J, Min C, Kim S, Yeom HY, Han H (2017) Ssd-assisted backup and recovery for database systems In: Data Engineering (ICDE), 2017 IEEE 33rd International Conference On, 285–296.. IEEE. ID - ref147 ER - TY - JOUR AU - Zeng, L. AU - Xu, S. AU - Wang, Y. PY - 2016 DA - 2016// TI - Vmbackup: an efficient framework for online virtual machine image backup and recovery JO - Concurrency Comput Pract Experience VL - 28 UR - https://doi.org/10.1002/cpe.3724 DO - 10.1002/cpe.3724 ID - Zeng2016 ER - TY - JOUR AU - Barber, C. AU - Hanser, T. AU - Judson, P. AU - Williams, R. PY - 2017 DA - 2017// TI - Distinguishing between expert and statistical systems for application under ICH M7 JO - Regulatory Toxicol Pharmacol VL - 84 UR - https://doi.org/10.1016/j.yrtph.2016.12.012 DO - 10.1016/j.yrtph.2016.12.012 ID - Barber2017 ER -