An SLR on Edge Computing Security and possible threat protection.
Harsiddh KalariyaKavish ShahVini PatelPublished in: CoRR (2022)
Keyphrases
- information security
- countermeasures
- security level
- security architecture
- network security
- protection scheme
- edge information
- security requirements
- critical infrastructure
- access control
- security issues
- computer security
- information systems
- data confidentiality
- data protection
- statistical databases
- edge detection
- cyber attacks
- key management
- protection mechanisms
- biometric template
- cyber crime
- previously mentioned
- insider threat
- edge detector
- database systems