UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system Journal article
Guangxue Zhang, Tian Wang, Guojun Wang, Anfeng Liu, Weijia Jia. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7).
Authors:  Guangxue Zhang;  Tian Wang;  Guojun Wang;  Anfeng Liu;  Weijia Jia
Favorite | TC[WOS]:67 TC[Scopus]:63  IF:1.5/1.5 | Submit date:2021/12/07
Fog Computing  Hidden Data Attacks  Internal Attacks  Sensor-cloud  Trust Evaluation Mechanism  
Survey on trust evaluation mechanism in sensor-cloud 传感云中的信任评价机制研究进展 Journal article
Wang T., Zhang G., Cai S., Jia W., Wang G.. Survey on trust evaluation mechanism in sensor-cloud 传感云中的信任评价机制研究进展[J]. Tongxin Xuebao/Journal on Communications, 2018, 39(6), 37-51.
Authors:  Wang T.;  Zhang G.;  Cai S.;  Jia W.;  Wang G.
Favorite | TC[Scopus]:10 | Submit date:2019/02/11
Fog Computing  Internal Attack  Sensor-cloud  Trust Evaluation Mechanism