Login / Signup
A standardized approach to deal with firewall and mobility policies in the IoT.
Sylvain Kubler
Kary Främling
Andrea Buda
Published in:
Pervasive Mob. Comput. (2015)
Keyphrases
</>
management system
cloud computing
intrusion detection
optimal policy
neural network
mobile agents
network traffic
network security
real time
state space
mobile phone
security enforcement