Login / Signup
A threat recognition solution of edge data security in industrial internet.
Qianmu Li
Huaqiu Long
Zhuoran Xu
Jun Hou
Junhui Cai
Published in:
World Wide Web (2022)
Keyphrases
</>
data security
access control
feature extraction
data centric
data privacy
data sets
information systems
data management
data driven
management system
privacy preserving data mining
data integrity