2023
DOI: 10.1109/access.2023.3290139
|View full text |Cite
|
Sign up to set email alerts
|

Energy-Efficient and Security-Aware Task Offloading for Multi-Tier Edge-Cloud Computing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…IDS models detect malicious activities by monitoring network traffic and system behaviours. While IDS models are effective in identifying known attacks, they may not perform well against new or sophisticated attacks, as they rely on predefined rules and signatures [27,28,29].…”
Section: Literature Surveymentioning
confidence: 99%
“…IDS models detect malicious activities by monitoring network traffic and system behaviours. While IDS models are effective in identifying known attacks, they may not perform well against new or sophisticated attacks, as they rely on predefined rules and signatures [27,28,29].…”
Section: Literature Surveymentioning
confidence: 99%
“…However, this scheme is vulnerable to both active and passive attacks and lacks support for SO. Almuseelem proposed an energy-efficient and security-conscious computing system in 2023 28 . This approach utilizes cloud and fog computing for offloading but does not address security concerns.…”
Section: Related Workmentioning
confidence: 99%