Login / Signup
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system.
Guangxue Zhang
Tian Wang
Guojun Wang
Anfeng Liu
Weijia Jia
Published in:
Concurr. Comput. Pract. Exp. (2021)
Keyphrases
</>
evaluation method
data sets
sensor data
data analysis
data sources
data acquisition
data quality
decision making
data mining techniques
anomaly detection
electronic commerce
evaluation methods