Intelligent attack defense scheme based on DQL algorithm in mobile fog computing
References
Index Terms
- Intelligent attack defense scheme based on DQL algorithm in mobile fog computing
Recommendations
Defense scheme against advanced persistent threats in mobile fog computing security
AbstractIn mobile fog computing (MFC), data processing and applications are concentrated in devices at the network’s edge. This means that data can be processed in local intelligent devices without being sent to the cloud for execution, ...
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing
ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network SecurityFog computing is a technology that provides distributed computing, storage and other services between cloud servers and Internet of Things(IoT) devices. It reduces the pressure on cloud servers and utilizes network edges for computing and storage, ...
Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing
This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and "pay-as-you-go" computing potential and on-demand provisioning of services. Governments, as well as organizations, ...
Comments
Information & Contributors
Information
Published In
Publisher
Academic Press, Inc.
United States
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0