References
- Y. Liu, M. Peng, G. Shou, Y. Chen and S. Chen, “Toward Edge Intelligence: Multiaccess Edge Computing for 5G and Internet of Things,” in IEEE Internet of Things Journal, vol. 7, no. 8, pp. 6722-6747, Aug. 2020.doi: https://doi.org/10.1109/JIOT.2020.3004500
- M. De Donno, K. Tange and N. Dragoni, “Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog,” in IEEE Access, vol. 7, pp. 150936-150948, 2019. doi: https://doi.org/10.1109/ACCESS.2019.2947652
- T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta and D. Sabella, “On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration,” in IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1657-1681, thirdquarter 2017.doi: https://doi.org/10.1109/COMST.2017.2705720
- S. N. Shirazi, A. Gouglidis, A. Farshad and D. Hutchison, “The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective,” in IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2586-2595, Nov. 2017.doi: https://doi.org/10.1109/JSAC.2017.2760478
- X. Wang, Y. Han, V. C. M. Leung, D. Niyato, X. Yan and X. Chen, “Convergence of Edge Computing and Deep Learning: A Comprehensive Survey,” in IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 869-904, Secondquarter 2020.doi: https://doi.org/10.1109/COMST.2020.2970550
- S. Wang et al., “A Cloud-Guided Feature Extraction Approach for Image Retrieval in Mobile Edge Computing,” in IEEE Transactions on Mobile Computing, vol. 20, no. 2, pp. 292-305, 1 Feb. 2021.doi: https://doi.org/10.1109/TMC.2019.2944371
- B. Li, Q. He, F. Chen, H. Jin, Y. Xiang and Y. Yang, “Auditing Cache Data Integrity in the Edge Computing Environment,” in IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 5, pp. 1210-1223, 1 May 2021.doi: https://doi.org/10.1109/TPDS.2020.3043755
- T. Alfakih, M. M. Hassan, A. Gumaei, C. Savaglio and G. Fortino, “Task Offloading and Resource Allocation for Mobile Edge Computing by Deep Reinforcement Learning Based on SARSA,” in IEEE Access, vol. 8, pp. 54074-54084, 2020.doi: https://doi.org/10.1109/ACCESS.2020.2981434
- X. Hou et al., “Reliable Computation Offloading for Edge-Computing-Enabled Software-Defined IoV,” in IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7097-7111, Aug. 2020.doi: https://doi.org/10.1109/JIOT.2020.2982292
- Gajanand Sharma, Himanshu Sharma, Rajneesh Pareek, Nidhi Gour, Ravi Shanker Sharma & Ashutosh Kumar (2021) Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks, Journal of Discrete Mathematical Sciences and Cryptography, 24:8, 2221-2232, DOI: https://doi.org/10.1080/09720529.2021.2009192
- Kumar, A., Sharma, G., Jain, P. et al. Virtual environments testing in cloud service enviorment: a framework to optimize the performance of virtual applications. Int J Syst Assur Eng Manag (2021). https://doi.org/https://doi.org/10.1007/s13198-021-01105-y