Mobile Edge Computing 2021
DOI: 10.1007/978-3-030-69893-5_11
|View full text |Cite
|
Sign up to set email alerts
|

Mobility-Based Resource Allocation and Provisioning in Fog and Edge Computing Paradigms: Review, Challenges, and Future Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 57 publications
0
0
0
Order By: Relevance
“…In order to categorise network traffic and spot hostile actions, the suggested technique utilises an intrusion detection system (IDS) that makes use of machine learning methods [17,19]. The IDS is able to identify suspicious activity by comparing network packets against a baseline of known good behaviour [17,20,21]. With this method, IoT devices can be monitored and alerted in real time, which improves their security and allows for faster responses and resolutions to security events [17,22].…”
Section: Related Workmentioning
confidence: 99%
“…In order to categorise network traffic and spot hostile actions, the suggested technique utilises an intrusion detection system (IDS) that makes use of machine learning methods [17,19]. The IDS is able to identify suspicious activity by comparing network packets against a baseline of known good behaviour [17,20,21]. With this method, IoT devices can be monitored and alerted in real time, which improves their security and allows for faster responses and resolutions to security events [17,22].…”
Section: Related Workmentioning
confidence: 99%
“…Edge computing is a widespread concept with significant advantages in IoT environments [49][50][51]. Because they are applied in big-data-processing systems, data security and dynamic node management are key issues in establishing a reliable environment.…”
Section: Background and Motivationsmentioning
confidence: 99%
“…However, there are restrictions to take into account when using the Gini index for CPS attack detection. The Gini index does not offer information about particular attack kinds or methodologies because it primarily concentrates on resource distribution [80]. Furthermore, the accuracy and dependability of resource allocation data have a direct impact on the Gini index's validity and effectiveness as an attack-detection tool [81].…”
mentioning
confidence: 99%