5G on the Horizon: Key Challenges for the Radio-Access Network, IEEE Vehicular Technology Magazine, vol.8, issue.3, pp.47-53, 2013. ,
DOI : 10.1109/MVT.2013.2269187
Seven ways that HetNets are a cellular paradigm shift, IEEE Communications Magazine, vol.51, issue.3, pp.136-144, 2013. ,
DOI : 10.1109/MCOM.2013.6476878
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.269.6705
A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks, IEEE Communications Surveys & Tutorials, vol.16, issue.3, pp.1-18, 2014. ,
DOI : 10.1109/SURV.2014.012214.00180
A Survey of Network Virtualization, Computer Networks, vol.54, issue.5, pp.862-876, 2010. ,
Towards a Network Abstraction Model for SDN, Journal of Network and Systems Management, vol.18, issue.3, pp.309-327, 2015. ,
DOI : 10.1145/354871.354874
An SDN-based framework for elastic resource sharing in integrated FDD/TDD LTE-A HetNets, 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), pp.126-131, 2014. ,
DOI : 10.1109/CloudNet.2014.6968980
Finding your Way in the Fog, ACM SIGCOMM Computer Communication Review, vol.44, issue.5, pp.27-32, 2014. ,
DOI : 10.1145/2677046.2677052
The Tactile Internet: Applications and Challenges, IEEE Vehicular Technology Magazine, vol.9, issue.1, pp.64-70, 2014. ,
DOI : 10.1109/MVT.2013.2295069
On security and privacy issues of fog computing supported Internet of Things environment, 2015 6th International Conference on the Network of the Future (NOF), pp.1-3, 2015. ,
DOI : 10.1109/NOF.2015.7333287
An overview of Fog computing and its security issues, Concurrency and Computation: Practice and Experience, 2015. ,
DOI : 10.1109/TDSC.2013.2297110
Fog Computing: Issues and Challenges, Proceedings of the 39 th IEEE Annual COMPSAC Conference, pp.53-59, 2015. ,
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud, 2012 IEEE Symposium on Security and Privacy Workshops, pp.125-128, 2012. ,
DOI : 10.1109/SPW.2012.19
Edge-centric Computing, ACM SIGCOMM Computer Communication Review, vol.45, issue.5, pp.37-42, 2015. ,
DOI : 10.1109/P2P.2010.5570003
SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY, International Journal of Software Engineering and Knowledge Engineering, vol.1957, issue.02, pp.285-309, 2007. ,
DOI : 10.1007/3-540-44564-1_1
Physical Attacks and Tamper Resistance, pp.143-173, 2011. ,
DOI : 10.1007/978-1-4419-8080-9_7
Towards a New Personal Information Technology Acceptance Model: Conceptualization and Empirical Evidence from a Bring Your Own Device Datataset, Proceedings of the 21 st AMCIS. AIS, 2015. ,
CSA): Security Guidance for Critical Areas of Focus in Cloud Computing v2, CSA, vol.1, 2009. ,
A framework to support selection of cloud providers based on security and privacy requirements, Journal of Systems and Software, vol.86, issue.9, pp.2276-2293, 2013. ,
DOI : 10.1016/j.jss.2013.03.011