Login / Signup

A Novel Scheme for Access Control Policy Generating and Evaluating in IoT based on Machine Learning.

Yinyan ZhaoMang SuJie WanJinpeng HouDong Mei
Published in: iThings/GreenCom/CPSCom/SmartData/Cybermatics (2020)
Keyphrases
  • machine learning
  • access control policies
  • access control
  • data mining
  • management system
  • security analysis
  • reinforcement learning
  • computational intelligence
  • third party
  • security policies
  • conflict resolution