Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  Fog Computing
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Due to the limitations in self-protection and information processing capabilities at IoT (Internet of Things) nodes, these nodes are susceptible to attacks, turning them into malicious nodes that cause damage or danger to the system. Early detection of these threats is essential to make timely recommendations and limit severe consequences for individuals and organizations. The study proposes applying a machine learning model to detect malicious traffic and IoT devices, which can be deployed and applied on the Fog IoT platform. This solution helps detect and early warn threats from IoT data before they are sent to the cloud. The model is evaluated on the IoT-23 dataset and gives good results.
2
Content available remote A fog computing architecture for security and quality of service
EN
The Fog Computing paradigm is an emerging architecture and focuses on optimizing resources for the Internet of Things environment, bringing to the Edge, Cloud's characteristics. The demand generated by the number of possible devices in this network attracts problems related to quality of service, security, among others, attracting researchers from the most diverse areas. In our work, in addition to performing a study on selected works in a mapping process, detecting trends in the use of Fog architectures. The main contribution is presented by a security-based Fog Computing architecture using QoS for scalable environments with Docker containers for orchestration and deployment of security with SDN.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.