Classification and Mapping of Adaptive Security for Mobile Computing.
Maryam SajjadAakash AhmadAsad Waqar MalikAhmed B. AltamimiIbrahim AlseadoonPublished in: IEEE Trans. Emerg. Top. Comput. (2020)
Keyphrases
- mobile computing
- wireless networks
- mobile devices
- context aware
- mobile computing environment
- mobile environments
- ubiquitous computing
- computing environments
- mobile users
- transaction model
- location tracking
- data collection
- mobile agents
- distributed systems
- databases
- wireless communication
- data management
- low bandwidth
- machine learning
- intrusion detection
- mobile technologies
- learning algorithm
- location dependent