Login / Signup
Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges.
Rodrigo Roman
Javier López
Masahiro Mambo
Published in:
CoRR (2016)
Keyphrases
</>
security threats
data analysis
mobile devices
data mining
information systems