Login / Signup
Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization.
Abdulrahman Khalid Alnaim
Published in:
Future Internet (2022)
Keyphrases
</>
data mining techniques
data processing
data sets
data structure
data analysis
database
input data
cloud computing
operating system
data acquisition
control system
data sources
data points
social networks
computer systems
temporal patterns
data transfer