Mostrando 2 resultados de: 2
Filtros aplicados
Subtipo de publicación
Article(2)
Área temáticas
Ciencias de la computación(2)
Virtualized Security at the Network Edge: A User-Centric Approach
ArticleAbstract: The current device-centric protection model against security threats has serious limitations. On onePalabras claves:Autores:Basile C., Bosco F., Charalambides S., Ciaccia F., Diego Montero, Georgiades M., Jacquin L., Kuusijärvi J., Lioy A., Nemirovsky M., Pastor A., Risso F., Sassu R., Serral-Gracià R., Shaw A., Yannuzzi M.Fuentes:googlescopusThe Unavoidable Convergence of NFV, 5G, and Fog: A Model-Driven Approach to Bridge Cloud and Edge
ArticleAbstract: The interplay between cloud and fog computing is crucial for the evolution of IoT, but the reach andPalabras claves:Autores:Carrera D., Diego Montero, Gutierrez A., Irons-Mclean R., Jain A., Marti J., Maso R., Parellada O.L., Pérez-Camaño J.L., Rodriguez J.P., Van Lingen F., Yannuzzi M.Fuentes:googlescopus