References
[1]. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.
[2]. Ananthanarayanan, G., Bahl, P., Bodík, P., Chintalapudi, K., Philipose, M., Ravindranath, L., & Sinha, S. (2017). Real-Time Video Analytics: The Killer App for Edge Computing. Computer, 50(10), 58-67.
[3]. Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W., & Lu, C. (2016). A cloud computing based network monitoring and threat detection system for critical infrastructures. Big Data Research, 3, 10-23.
[4]. Frankston, B. (2016). Mobile-Edge Computing versus The Internet?: Looking beyond the literal meaning of MEC. IEEE Consumer Electronics Magazine, 5(4), 75-76.
[5]. Jackson, K. R., Ramakrishnan, L., Muriki, K., Canon, S., Cholia, S., Shalf, J., & Wright, N. J. (2010, November). Performance analysis of high performance computing applications on the amazon web services cloud. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on (pp. 159-168). IEEE.
[6]. Li, A., Yang, X., Kandula, S., & Zhang, M. (2010, November). CloudCmp: comparing public cloud th providers. In Proceedings of the 10 ACM SIGCOMM Conference on Internet Measurement (pp. 1-14). ACM.
[7]. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125- 1142.
[8]. Linthicum, D. (2016). Responsive data architecture for the Internet of Things. Computer, 49(10), 72-75.
[9]. Raychaudhuri, D., Nagaraja, K., & Venkataramani, A. (2012). Mobilityfirst: a robust and trustworthy mobilitycentric architecture for the future internet. ACM SIGMOBILE Mobile Computing and Communications Review, 16(3), 2-13.
[10]. Reale, A. (2017). A guide to Edge IoT Analytics [Blog Post]. Retrieved from https://www.ibm.com/blogs/internetof- things/edge-iot-analytics/
[11]. Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing: Vision and challenges. IEEE Internet of Things Journal, 3(5), 637-646.
[12]. Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3-9.
[13]. Wortmann, F., & Flüchter, K. (2015). Internet of Things. Business & Information Systems Engineering, 57(3), 221- 224.
[14]. Wu, J., & Zhao, W. (2017). Design and realization of WInternet: From net of things to internet of things. ACM Transactions on Cyber-Physical Systems, 1(1), 1-12.
[15]. Yu, W., Liang, F., He, X., Hatcher, W. G., Lu, C., Lin, J., & Yang, X. (2018). A survey on the edge computing for the Internet of Things. IEEE Access, 6, 6900-6919.
[16]. Yu, W., Xu, G., Chen, Z., & Moulema, P. (2013, October). A cloud computing based architecture for cyber security situation awareness. In Communications and Network Security (CNS), 2013 IEEE Conference on (pp. 488-492). IEEE.