Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Gorlatova, Maria & Inaltekin, Hazer & Chiang, Mung. (2018). Characterizing Task Completion Latencies in Fog Computing. [2] Ling, Tonghua & He, Wenchao & Liu, Xianjun & Zhang, Sheng & Huang, Fu & Hua, Fei. (2022). Fine grid model for the dielectric characteristics of ground?penetrating radar in mixed media. Geophysical Prospecting. 70. 10.1111/1365-2478.13214. [3] Michael, Dennis & Indrajit, Richardus & Dazki, Erick. (2022). Implementation of Enterprise Architecture in Cloud Computing Companies. Sinkron. 7. 549-559. 10.33395/sinkron.v7i2.11407. [4] Banger, Nanda & K, Pallavi & Shetty, Mrs. (2022). A Review Paper on Cloud Computing Architecture, Types, Advantages and Disadvantages. International Journal of Advanced Research in Science, Communication and Technology. 14-22. 10.48175/IJARSCT-3144. [5] Ramesh, Varsha & Nair, Siddharth & Tyagi, Amit. (2022). The Fog/Edge Computing: Challenges, Serious Concerns, and the Road Ahead. 10.1002/9781119792437.ch16. [6] Maloth, Bhav Singh & Anusha, R. & Reddy, R. & Devi, S.Chaya. (2013). Augmentation of Information Security by Cryptography in Cloud Computing. www.ijcst.com. 4. [7] Deokar, Sanjivani & Mangla, Monika & Akhare, Rakhi. (2021). A Secure Fog Computing Architecture for Continuous Health Monitoring. 10.1007/978-3-030-46197-3_11. [8 Lin, Rongheng & Ye, Zezhou & Wang, Hao & Wu, Budan. (2018). Chronic Diseases and Health Monitoring Big Data: A Survey. IEEE Reviews in Biomedical Engineering. PP. 1-1. 10.1109/RBME.2018.2829704. [9] Hamid, Hadeal & Rahman, Sk Md Mizanur & Hossain, M. Shamim & Almogren, Ahmad & Alamri, Atif. (2017). A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography. IEEE Access. PP. 1-1. 10.1109/ACCESS.2017.2757844. [10] Kurikala, Geetha & Koppuravuari, Gurnadha & Swapna, A. (2017). Fog Computing : Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology. International Journal of Scientific Research in Computer Science Engineering and Information Technology. 4. 2456-3307. [11] Vishwanath, Akhilesh & Peruri, Ramya & He, Jing. (2016). Security in Fog Computing through Encryption. International Journal of Information Technology and Computer Science. 8. 28-36. 10.5815/ijitcs.2016.05.03. [12] Kraemer, Frank & Bråten, Anders & Tamkittikhun, Nattachart & Palma, David. (2017). Fog Computing in Healthcare – A Review and Discussion. IEEE Access. PP. 9206-9222. 10.1109/ACCESS.2017.2704100. [13] Mouradian, Carla & Naboulsi, Diala & Yangui, Sami & Glitho, Roch & Morrow, Monique & Polakos, Paul. (2017). A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges. IEEE Communications Surveys & Tutorials. PP. 10.1109/COMST.2017.2771153. [14] Vishwanath, Akhilesh & Peruri, Ramya & He, Jing. (2016). Security in Fog Computing through Encryption. International Journal of Information Technology and Computer Science. 8. 28-36. 10.5815/ijitcs.2016.05.03. [15] Alexandru, Adriana & Coardos, Dora. (2016). Big Data în Healthcare and Medical Applications in România. Big Data în Healthcare and Medical Applications in România. [16] Abouelmehdi, Karim & Beni-Hessane, Abderrahim & Khaloufi, Hayat. (2018). Big healthcare data: preserving security and privacy. Journal of Big Data. 5. 10.1186/s40537-017-0110-7. [17] Geetha Kurikala, K Gurnadha Gupta, A. Swapna.(2017). Fog Computing: Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology.” 2(4). [18] Malek Ben Salem and Salvatore J. Stolfo(2011). Decoy Document Deployment for Effective Masquerade Attack Detection. 7. [19] Nisha Peter. (2015 ). Fog Computing and Its Real Time Applications. International Journal of Emerging Technology and Advanced Engineering, 7. [20] Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan. “Fog Computing: Will It Be the Future of Cloud Computing?” ISBN: 978-1-941968-00-0, 2014. [21] Komal Thorat, Shweta Dawkhar, Mansi Kulkarni, Samiksha Wale (2020). Preserving the Privacy of Chronical Big Data Using Fog and Cloud Computing.9(6).
![]() | V9I1004.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|