Trustworthy authorization method for security in Industrial Internet of Things.
Yang ZhaoJiachen YangYongjun BaoHoubing SongPublished in: Ad Hoc Networks (2021)
Keyphrases
- experimental evaluation
- high accuracy
- significant improvement
- similarity measure
- industrial applications
- synthetic data
- detection method
- image sequences
- pairwise
- prior knowledge
- high precision
- classification accuracy
- security policies
- classification method
- segmentation method
- detection algorithm
- feature set
- data sets
- probabilistic model
- dynamic programming
- decision trees