Mitigating cyber threats at the network edge.
Toyin SofoluweFung Po TsoIain W. PhillipsPublished in: IMC (2022)
Keyphrases
- cyber security
- complex networks
- edge detection
- peer to peer
- security threats
- network model
- network structure
- cyber attacks
- critical infrastructure
- network architecture
- denial of service attacks
- network management
- countermeasures
- edge information
- mobile devices
- communication networks
- computer networks
- wireless sensor networks