Login / Signup
A trust-based strategy for addressing residual attacks in the RELOAD architecture.
Oussema Dabbebi
Remi Badonnel
Olivier Festor
Published in:
ICC (2012)
Keyphrases
</>
countermeasures
management system
neural network
trust model
distributed architecture
search engine
cloud computing
selection strategy
computer security
architectural design