Login / Signup
A Trust-based algorithms for securing IoT clusters in an edge computing environment.
Nadia Kammoun
Aida Ben Chehida Douss
Ryma Abassi
Published in:
ComNet (2023)
Keyphrases
</>
computing environments
computational complexity
data structure
worst case
mobile computing
learning algorithm
computational intelligence
hierarchical clustering
agglomerative hierarchical clustering