Open Access iconOpen Access

ARTICLE

crossmark

An Efficient Impersonation Attack Detection Method in Fog Computing

Jialin Wan1, Muhammad Waqas1,2, Shanshan Tu1,*, Syed Mudassir Hussain3, Ahsan Shah2, Sadaqat Ur Rehman4, Muhammad Hanif2

1 Engineering Research Center of Intelligent Perception and Autonomous Control, Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
2 Faculty of Computer Science and Engineering, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Topi, 23460, Pakistan
3 Department of Electronics Engineering, FICT, Balochistan University of Information Technology, Engineering and Management Sciences, Quetta, 87300, Pakistan
4 Department of Computer Science, Namal Institute, Mianwali, 42200, Pakistan

* Corresponding Author: Shanshan Tu. Email: email

TSP_CMC_16260.pdf

  • 2274

    View

  • 1427

    Download

  • 0

    Like

Share Link