{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:24:16Z","timestamp":1775787856458,"version":"3.50.1"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Consumer Electron. Mag."],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/mce.2018.2851723","type":"journal-article","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T22:17:58Z","timestamp":1539037078000},"page":"45-50","source":"Crossref","is-referenced-by-count":164,"title":["Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices"],"prefix":"10.1109","volume":"7","author":[{"given":"Fuhong","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yutong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xingsuo","family":"An","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.06.012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.060513.130351"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1109\/TVT.2011.2163431","article-title":"Optimal max&#x2013;min fair resource allocation in multihop relay-enhanced WiMAX networks","volume":"60","author":"mihail","year":"2011","journal-title":"IEEE Trans Veh Technol"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2384392"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2396525"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.010214.131970"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2284494"},{"key":"ref18","author":"waldspurger","year":"1995","journal-title":"Lottery and Stride Scheduling Flexible Proportional-Share Resource Management"},{"key":"ref19","first-page":"323","article-title":"Dominant resource fairness: Fair allocation of multiple resource types","author":"ghodsi","year":"0","journal-title":"Proc Usenix Conf Networked Systems Design and Implementation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2590099"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2614418"},{"key":"ref6","article-title":"Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges","author":"roman","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721750"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/MCE.2017.2685018","article-title":"Product safety of the Internet of Things","volume":"6","author":"bill","year":"2017","journal-title":"IEEE Consum Electron Mag"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.30"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2590118"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2692960"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571049"},{"key":"ref20","first-page":"1","article-title":"No justified complaints: On fair sharing of multiple resources","author":"dolev","year":"0","journal-title":"Proc Innov Theor Comput Sci Conf"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2362139"},{"key":"ref21","first-page":"583","article-title":"Dominant resource fairness in cloud computing systems with heterogeneous servers","author":"wang","year":"0","journal-title":"Proc IEEE Conf Computer Communications"},{"key":"ref24","first-page":"365","article-title":"Choosy, max&#x2013;min fair sharing for datacenter jobs with constraints","author":"ghodsi","year":"0","journal-title":"ACM EuroSys 2013"},{"key":"ref23","first-page":"1","article-title":"Multi-resource fair queueing for packet processing","author":"ghodsi","year":"0","journal-title":"Proc ACM 2012 Conf Applications Technologies Architectures and Protocols Computer Communication"},{"key":"ref26","first-page":"14","article-title":"DMMF: Dominant and max&#x2013;min fair allocation in satellite networks","volume":"12","author":"lin","year":"2015","journal-title":"China Commun"},{"key":"ref25","first-page":"1","article-title":"Multi-layer resources fair allocation in big data with heterogeneous demands","volume":"98","author":"lin","year":"2017","journal-title":"Wireless Personal Commun"}],"container-title":["IEEE Consumer Electronics Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962380\/8482507\/08482528.pdf?arnumber=8482528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:17:04Z","timestamp":1642004224000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8482528\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":26,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mce.2018.2851723","relation":{},"ISSN":["2162-2248","2162-2256"],"issn-type":[{"value":"2162-2248","type":"print"},{"value":"2162-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]}}}