STEC-IoT: A Security Tactic by Virtualizing Edge Computing on IoT.
Peiying ZhangChunxiao JiangXue PangYi QianPublished in: CoRR (2022)
Keyphrases
- database
- security problems
- key management
- management system
- cloud computing
- information security
- big data
- security issues
- security mechanisms
- security requirements
- statistical databases
- security threats
- data security
- security policies
- mobile computing
- ubiquitous computing
- rfid systems
- image segmentation
- security level
- information assurance
- security management
- security systems
- network security
- ad hoc networks
- edge detection
- wireless sensor networks
- data mining