Sign in

A threat recognition solution of edge data security in industrial internet.

Qianmu LiHuaqiu LongZhuoran XuJun HouJunhui Cai
Published in: World Wide Web (2022)
Keyphrases
  • data security
  • access control
  • feature extraction
  • data centric
  • data privacy
  • data sets
  • information systems
  • data management
  • data driven
  • management system
  • privacy preserving data mining
  • data integrity