Securing Smart Contracts in Fog Computing: Machine Learning-Based Attack Detection for Registration and Resource Access Granting.
Tahmina EhsanMuhammad Usman SanaMuhammad Usman AliElizabeth Caro MonteroEduardo Silva AlvaradoSirojiddin DjuraevImran AshrafPublished in: IEEE Access (2024)
Keyphrases
- attack detection
- machine learning
- multistage
- learning algorithm
- resource constraints
- text mining
- computational intelligence
- data mining
- role based access control
- product recommendation
- data analysis
- support vector machine
- text classification
- access control
- intrusion detection system
- cyber attacks
- information systems