2021
DOI: 10.1016/j.simpat.2021.102292
|View full text |Cite
|
Sign up to set email alerts
|

QoS Performance Enhancement Policy through Combining Fog and SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 49 publications
0
6
0
Order By: Relevance
“…IDSs have been increasingly incorporated into SDN to bolster network security. These systems enable real-time traffic monitoring and analysis, facilitating centralized control, dynamic policy updates, resource optimization, and adaptive security measures [55,56]. IDS in SDN employ two primary detection methods: signaturebased and anomaly-based [57,58].…”
Section: Sdn Security and Intrusion Detectionmentioning
confidence: 99%
“…IDSs have been increasingly incorporated into SDN to bolster network security. These systems enable real-time traffic monitoring and analysis, facilitating centralized control, dynamic policy updates, resource optimization, and adaptive security measures [55,56]. IDS in SDN employ two primary detection methods: signaturebased and anomaly-based [57,58].…”
Section: Sdn Security and Intrusion Detectionmentioning
confidence: 99%
“…In addition, a new software‐defined multicast system has been introduced to make the creation and execution of P2P live video streaming easier. To enhance the QoS, Ahammad et al 30 developed a combinational network architecture that combines the SDN with fog computing (FC), assuring that the SDN controller has complete control over the network. The architecture explains and shows how the connection between the top and base layers of the SDN and FC works.…”
Section: Related Workmentioning
confidence: 99%
“…A paper developed a hybrid encryption algorithm using three symmetric encryption algorithms and digital technique [23] for secure cloud file storage [24]. Based on the statistics [25], various hybrid cryptographic models suggest to using AES and FHE to overcome security issues like data confidentiality, privacy, and integrity [26]. Another research work implemented a hybrid security model for securing medical patient's data stored in the cloud [27].…”
Section: Related Work Of Cloud Securitymentioning
confidence: 99%