2019
DOI: 10.1109/tnsm.2019.2939221
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 66 publications
(30 citation statements)
references
References 39 publications
0
30
0
Order By: Relevance
“…Based on the vocabulary list of Pascal, the resulted document is a vector with the size of 1 × 2788. In the vector, the {1, 2,8,9,15,20,1348,1350,1359,1363,1365,1394,1396,1425,1442,1452,1455,1458,1461,1465,1466,1467, 2788} digits are set as {100, 100, 100, 100, 200, 199, 1, 200, 200, 100, 100, 100, 100, 200, 200, 200, 200, 200, 200, 199, 1, 199, 1}, respectively. Note that this session should come from a test session because it contains IL_others, IC_others, and PS_others values.…”
Section: Data Preprocessmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the vocabulary list of Pascal, the resulted document is a vector with the size of 1 × 2788. In the vector, the {1, 2,8,9,15,20,1348,1350,1359,1363,1365,1394,1396,1425,1442,1452,1455,1458,1461,1465,1466,1467, 2788} digits are set as {100, 100, 100, 100, 200, 199, 1, 200, 200, 100, 100, 100, 100, 200, 200, 200, 200, 200, 200, 199, 1, 199, 1}, respectively. Note that this session should come from a test session because it contains IL_others, IC_others, and PS_others values.…”
Section: Data Preprocessmentioning
confidence: 99%
“…e security issues in MEC include application layer security, network layer security, data security, and node security. Intrusion detection systems (IDSs) protect the network layer security for MEC and have been an important component in it [2]. ere are two methods to detect intrusions in general, i.e., signature-based method and anomaly-based method.…”
Section: Introductionmentioning
confidence: 99%
“…The WebGIS system in this paper refers to the principle of device-enhanced MEC by enabling user terminals as edge nodes for connection establishment [45]- [46]…”
Section: Device-enhanced Mecmentioning
confidence: 99%
“…Second is the way of distributing the services on different heterogeneous available resources, which is mapped to the container placement problem in our previous work [6]. Various approaches in the literature have also considered solving the problem of placing tasks on resources [17][18][19], where heuristics was proved to take an accurate selection and placement decisions. However, predicting the right time and best place to assign the service to remains an open problem because of the nondeterministic user behavior and random requests of service assignments.…”
Section: Fog Computing Existing Challengesmentioning
confidence: 99%