[1]
G. Rahman and C. C. Wen, “Fog Computing, Applications, Security and Challenges, Review”, IJET, vol. 7, no. 3, pp. 1615–1621, Jul. 2018, doi: 10.14419/ijet.v7i3.12612.