Login / Signup
Confident Security Relation for Edge Computing-based loT Applications.
Hameed Almubarak
Ahmed Jedidi
Published in:
SSD (2024)
Keyphrases
</>
intrusion detection
security systems
security requirements
information security
security issues
high security
database
security problems
high confidence
edge information
weighted graph
network security
multiple scales
key management
computer security
low cost
sensor networks
case study
security management
data mining