Sign in

Threat Modeling of Edge-Based IoT Applications.

Massimo FiccoDaniele GranataMassimiliano RakGiovanni Salzillo
Published in: QUATIC (2021)
Keyphrases
  • information retrieval
  • learning algorithm
  • database
  • artificial intelligence
  • artificial neural networks
  • modeling method