, Face recognition: Moving more and more to the edge -asmag

, A Guide to the Internet of Things Infographic

, Social Internet of Things

P. S. Banerjee and B. Maiti, Optimality criterion for the insertion of multi-interface nodes to improve connectivity in heterogeneous IoT framework, 2017 Devices for Integrated Circuit (DevIC), pp.556-560, 2017.

K. Bilal and A. Erbad, Edge computing for interactive media and video streaming, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), pp.68-73, 2017.

P. Bonacich, Power and centrality: A family of measures, American journal of sociology, vol.92, issue.5, pp.1170-1182, 1987.

F. Brockners, S. Bhandari, S. Dara, C. Pignataro, H. Gedler et al., Proof of Transit, Network Working Group Internet-Draft, 2018.

M. Dehmer and F. Emmert-streib, Quantitative Graph Theory: Mathematical Foundations and Applications. Discrete Mathematics and Its Applications, 2014.

B. Donassolo, I. Fajjari, A. Legrand, and P. Mertikopoulos, Fog Based Framework for IoT Service Provisioning, 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp.1-6, 2019.
URL : https://hal.archives-ouvertes.fr/hal-01859695

B. Dorsemaine, J. Gaulier, J. Wary, N. Kheir, and P. Urien, Internet of Things: A definition & taxonomy, Next Generation Mobile Applications, Services and Technologies, pp.72-77, 2015.

D. Evans, The internet of things: How the next evolution of the internet is changing everything, vol.1, pp.1-11, 2011.

S. Faux, La sécuritéà l'ère des objets connectés: Comment s'y prendre ?, Workshop "Sécurité Des Objets Connectés, 2017.

L. C. Freeman, A Set of Measures of Centrality Based on Betweenness, Sociometry, vol.40, issue.1, pp.35-41, 1977.

M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, 1978.

. Gartner, Gartner Says 4.9 Billion Connected "Things" Will Be in Use in 2015, 2014.

A. Ghose, B. Li, and S. Liu, Mobile Targeting Using Customer Trajectory Patterns, p.52

. Hp and . Hp, Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack, 2014.

F. B. Jemaa, G. Pujolle, and M. Pariente, QoS-Aware VNF Placement Optimization in Edge-Central Carrier Cloud Architecture, 2016 IEEE Global Communications Conference (GLOBECOM), pp.1-7, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02099092

A. Mosenia and N. K. Jha, A Comprehensive Study of Security of Internet-of-Things, IEEE Transactions on Emerging Topics in Computing, vol.5, issue.4, pp.586-602, 2017.

M. H. Onik, N. Al-zaben, H. P. Hoo, and C. Kim, A Novel Approach for Network Attack Classification Based on Sequential Questions, vol.2, p.14, 2018.

B. Ruhnau, Eigenvector-centrality-a node-centrality? Social networks, vol.22, pp.357-365, 2000.

G. Sabidussi, The centrality index of a graph, Psychometrika, vol.31, issue.4, pp.581-603, 1966.

O. Skarlat, M. Nardelli, and S. Schulte,

M. Borkowski and P. Leitner, Optimized IoT service placement in the fog, Service Oriented Computing and Applications, vol.11, issue.4, pp.427-443, 2017.

I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz, and J. Lopez, A Survey of IoT-enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services, IEEE Communications Surveys Tutorials, pp.1-1, 2018.

Y. Xia, X. Etchevers, L. Letondeur, T. Coupaye, and F. Desprez, Combining hardware nodes and software components ordering-based heuristics for optimizing the placement of distributed IoT applications in the fog, Proceedings of the 33rd Annual ACM Symposium on Applied Computing -SAC '18, pp.751-760, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01908928