, Face recognition: Moving more and more to the edge -asmag
, A Guide to the Internet of Things Infographic
, Social Internet of Things
Optimality criterion for the insertion of multi-interface nodes to improve connectivity in heterogeneous IoT framework, 2017 Devices for Integrated Circuit (DevIC), pp.556-560, 2017. ,
Edge computing for interactive media and video streaming, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), pp.68-73, 2017. ,
Power and centrality: A family of measures, American journal of sociology, vol.92, issue.5, pp.1170-1182, 1987. ,
Proof of Transit, Network Working Group Internet-Draft, 2018. ,
, Quantitative Graph Theory: Mathematical Foundations and Applications. Discrete Mathematics and Its Applications, 2014.
Fog Based Framework for IoT Service Provisioning, 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp.1-6, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01859695
Internet of Things: A definition & taxonomy, Next Generation Mobile Applications, Services and Technologies, pp.72-77, 2015. ,
The internet of things: How the next evolution of the internet is changing everything, vol.1, pp.1-11, 2011. ,
La sécuritéà l'ère des objets connectés: Comment s'y prendre ?, Workshop "Sécurité Des Objets Connectés, 2017. ,
A Set of Measures of Centrality Based on Betweenness, Sociometry, vol.40, issue.1, pp.35-41, 1977. ,
Computers and Intractability: A Guide to the Theory of NP-Completeness, 1978. ,
Gartner Says 4.9 Billion Connected "Things" Will Be in Use in 2015, 2014. ,
Mobile Targeting Using Customer Trajectory Patterns, p.52 ,
Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack, 2014. ,
QoS-Aware VNF Placement Optimization in Edge-Central Carrier Cloud Architecture, 2016 IEEE Global Communications Conference (GLOBECOM), pp.1-7, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02099092
A Comprehensive Study of Security of Internet-of-Things, IEEE Transactions on Emerging Topics in Computing, vol.5, issue.4, pp.586-602, 2017. ,
A Novel Approach for Network Attack Classification Based on Sequential Questions, vol.2, p.14, 2018. ,
Eigenvector-centrality-a node-centrality? Social networks, vol.22, pp.357-365, 2000. ,
The centrality index of a graph, Psychometrika, vol.31, issue.4, pp.581-603, 1966. ,
,
Optimized IoT service placement in the fog, Service Oriented Computing and Applications, vol.11, issue.4, pp.427-443, 2017. ,
A Survey of IoT-enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services, IEEE Communications Surveys Tutorials, pp.1-1, 2018. ,
Combining hardware nodes and software components ordering-based heuristics for optimizing the placement of distributed IoT applications in the fog, Proceedings of the 33rd Annual ACM Symposium on Applied Computing -SAC '18, pp.751-760, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01908928