共 23 条
- [1] ARMBRUST M, FOX A, GRIFFITH R, Et al., A view of cloud computing, Communications of the ACM, 53, 4, pp. 50-58, (2010)
- [2] HU Y C, PATEL M, SABELLA D, Et al., Mobile edge computing-a key technology towards 5G[R], (2015)
- [3] LUAN T H, GAO L X, LI Z, Et al., Fog computing: focusing on mobile users at the edge, (2015)
- [4] PRABAVATHY S, SUNDARAKANTHAM K, SHALINIE S M., Design of cognitive fog computing for intrusion detection in Internet of things, Journal of Communications and Networks, 20, 3, pp. 291-298, (2018)
- [5] LI Y, HUANG C L, WANG Z F, Et al., Survey of software vulnerability mining methods based on machine learning, Journal of Software, 31, 7, pp. 2040-2061, (2020)
- [6] ZHANG Y Q, DONG Y, LIU C Y, Et al., Situation, trends and prospects of deep learning applied to cyberspace security, Journal of Computer Research and Development, 55, 6, pp. 1117-1142, (2018)
- [7] LEE S J, YOO P D, ASYHARI A T, Et al., IMPACT: impersonation attack detection via edge computing using deep autoencoder and feature abstraction, IEEE Access, 8, pp. 65520-65529, (2020)
- [8] LI Z C, GAO H Y, ZHANG W X., An efficient edge computing intrusion detection algorithm based on improved ELM, Computer Measurement & Control, 29, 7, pp. 223-228, (2021)
- [9] SUDQI K B, ABDUL W A W B, IDRIS M Y I B, Et al., A lightweight perceptron-based intrusion detection system for fog computing, Applied Sciences, 9, 1, (2019)
- [10] SOUZA C A D, WESTPHALL C B, MACHADO R B, Et al., Hybrid approach to intrusion detection in fog-based IoT environments, Computer Networks, 180, (2020)