• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Edge-based auditing method for data security in resource-constrained Internet of Things.

Tian WangYaxin MeiXuxun LiuJin WangHong-Ning DaiZhijian Wang
Published in: J. Syst. Archit. (2021)
Keyphrases
  • resource constrained
  • access control
  • databases
  • feature extraction
  • software development
  • software systems