Login / Signup

Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system.

Guangxue ZhangTian WangGuojun WangAnfeng LiuWeijia Jia
Published in: Concurr. Comput. Pract. Exp. (2021)
Keyphrases
  • evaluation method
  • data sets
  • sensor data
  • data analysis
  • data sources
  • data acquisition
  • data quality
  • decision making
  • data mining techniques
  • anomaly detection
  • electronic commerce
  • evaluation methods