Login / Signup
Identification of security threats, safety hazards, and interdependencies in industrial edge computing.
Patrick Denzler
Siegfried Hollerer
Thomas Frühwirth
Wolfgang Kastner
Published in:
SEC (2021)
Keyphrases
</>
security threats
security issues
security mechanisms
key management
security risks
data sets
resource constrained
database
data mining
data streams
low cost
peer to peer
network security