Login / Signup
Blockchain-assisted Undisclosed IIoT Vulnerabilities Trusted Sharing Protection with Dynamic Token.
Jingyu Feng
Yifei Shi
Neal N. Xiong
Feng Xiao
Published in:
CoRR (2021)
Keyphrases
</>
information security
countermeasures
dynamic environments
data mining
social networks
information systems
information sharing
distributed environment
security mechanisms
dynamically changing