2023
DOI: 10.1016/j.neucom.2023.126533
|View full text |Cite
|
Sign up to set email alerts
|

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 107 publications
0
1
0
Order By: Relevance
“…Second, because devices in edge computing are placed in a physically accessible location, physical intrusion also acts as an important threat. Security attacks in these environments include denial-of-service (DoS) and distributed-denial-of-service (DDoS) attacks, malware propagation, and data leakage [2]. In particular, edge computing environments are used for applications that require real-time data processing and management, so these attacks can severely affect the performance of the system.…”
Section: Introductionmentioning
confidence: 99%
“…Second, because devices in edge computing are placed in a physically accessible location, physical intrusion also acts as an important threat. Security attacks in these environments include denial-of-service (DoS) and distributed-denial-of-service (DDoS) attacks, malware propagation, and data leakage [2]. In particular, edge computing environments are used for applications that require real-time data processing and management, so these attacks can severely affect the performance of the system.…”
Section: Introductionmentioning
confidence: 99%