Device Onboarding Using FDO and the Untrusted Installer Model.
Geoffrey H. CooperPublished in: Commun. ACM (2024)
Keyphrases
- computational model
- high level
- management system
- network model
- formal model
- closed form
- theoretical framework
- expert systems
- objective function
- sensitivity analysis
- simulation model
- real time
- database
- probabilistic model
- probability distribution
- prior knowledge
- process model
- statistical model
- hierarchical structure
- data sets
- object model