Skip to main content

Correction: Fog computing network security based on resources management

The Original Article was published on 14 June 2023

Correction to: J Wireless Com Network (2023) 2023:50 https://doi.org/10.1186/s13638-023-02256-1

Following publication of the original article, the authors flagged the errors with the affiliations information and the declarations of the article. Concerning the former, the second author, Dr Salwa Othmen, had been erroneously assigned affiliations '1, 2' rather than '2', there correction affiliation. Regarding the latter, the following Acknowledgments declaration had been omitted in error: The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University, Arar, KSA, for funding this research work through the project number “NBU-FFR-2023-0061".

The published article has been updated to correct these errors.

The authors thank you for reading this erratum and apologize for any inconvenience caused.

Reference

  1. W.B. Daoud et al., EURASIP J. Wirel. Commun. Netw. 2023, 50 (2023). https://doi.org/10.1186/s13638-023-02256-1

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wided Ben Daoud.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Daoud, W.B., Othmen, S., Hamdi, M. et al. Correction: Fog computing network security based on resources management. J Wireless Com Network 2023, 108 (2023). https://doi.org/10.1186/s13638-023-02318-4

Download citation

  • Published:

  • DOI: https://doi.org/10.1186/s13638-023-02318-4