Sign in

Identification of security threats, safety hazards, and interdependencies in industrial edge computing.

Patrick DenzlerSiegfried HollererThomas FrühwirthWolfgang Kastner
Published in: SEC (2021)
Keyphrases
  • security threats
  • security issues
  • security mechanisms
  • key management
  • security risks
  • data sets
  • resource constrained
  • database
  • data mining
  • data streams
  • low cost
  • peer to peer
  • network security