Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system
Authors
Keywords
-
Journal
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
Volume -, Issue -, Pages e5109
Publisher
Wiley
Online
2018-12-27
DOI
10.1002/cpe.5109
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks
- (2018) Edwin Prem Kumar Gilbert et al. COMPUTERS & ELECTRICAL ENGINEERING
- A novel trust mechanism based on Fog Computing in Sensor–Cloud System
- (2018) Tian Wang et al. Future Generation Computer Systems-The International Journal of eScience
- Fog-based storage technology to fight with cyber threat
- (2018) Tian Wang et al. Future Generation Computer Systems-The International Journal of eScience
- Big Data Reduction for a Smart City’s Critical Infrastructural Health Monitoring
- (2018) Tian Wang et al. IEEE COMMUNICATIONS MAGAZINE
- Efficient and Scalable Runtime Monitoring for Cyber–Physical System
- (2018) Xi Zheng et al. IEEE Systems Journal
- A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems
- (2018) Mingfeng Huang et al. IEEE Transactions on Systems Man Cybernetics-Systems
- A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs
- (2018) Boyuan Sun et al. IEEE Access
- Sensor-cloud data acquisition based on fog computation and adaptive block compressed sensing
- (2018) Zhou-zhou Liu et al. International Journal of Distributed Sensor Networks
- High-accuracy localization for indoor group users based on extended Kalman filter
- (2018) Tian Wang et al. International Journal of Distributed Sensor Networks
- Fog-Based Computing and Storage Offloading for Data Synchronization in IoT
- (2018) Tian Wang et al. IEEE Internet of Things Journal
- Data collection from WSNs to the cloud based on mobile Fog elements
- (2017) Tian Wang et al. Future Generation Computer Systems-The International Journal of eScience
- On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network
- (2017) Sudip Misra et al. IEEE Systems Journal
- Dependable Structural Health Monitoring Using Wireless Sensor Networks
- (2017) Md Zakirul Alam Bhuiyan et al. IEEE Transactions on Dependable and Secure Computing
- Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks
- (2017) Zhihua Zhang et al. IEEE Access
- BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks
- (2016) Weidong Fang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cloud-Assisted Data Fusion and Sensor Selection for Internet of Things
- (2016) Farshid Hassani Bijarbooneh et al. IEEE Internet of Things Journal
- Detecting Malicious Data Injections in Wireless Sensor Networks
- (2015) Vittorio P. Illiano et al. ACM COMPUTING SURVEYS
- A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud
- (2015) Jianhua Liu et al. APPLIED SOFT COMPUTING
- A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks
- (2015) Salmin Sultana et al. IEEE Transactions on Dependable and Secure Computing
- An Efficient Distributed Trust Model for Wireless Sensor Networks
- (2015) Jinfang Jiang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks
- (2015) Nabila Labraoui et al. WIRELESS PERSONAL COMMUNICATIONS
- Data Density Correlation Degree Clustering Method for Data Aggregation in WSN
- (2014) Fei Yuan et al. IEEE SENSORS JOURNAL
- LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
- (2013) Xiaoyong Li et al. IEEE Transactions on Information Forensics and Security
- Trustworthiness Management in the Social Internet of Things
- (2013) Michele Nitti et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Trust management system in wireless sensor networks: design considerations and research challenges
- (2013) Farruh Ishmanov et al. Transactions on Emerging Telecommunications Technologies
- Nearest neighbor imputation using spatial–temporal correlations in wireless sensor networks
- (2012) YuanYuan Li et al. Information Fusion
- Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
- (2011) Yanli Yu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started