Login / Signup

A Trust-based algorithms for securing IoT clusters in an edge computing environment.

Nadia KammounAida Ben Chehida DoussRyma Abassi
Published in: ComNet (2023)
Keyphrases
  • computing environments
  • computational complexity
  • data structure
  • worst case
  • mobile computing
  • learning algorithm
  • computational intelligence
  • hierarchical clustering
  • agglomerative hierarchical clustering