Login / Signup

Edge-based auditing method for data security in resource-constrained Internet of Things.

Tian WangYaxin MeiXuxun LiuJin WangHong-Ning DaiZhijian Wang
Published in: J. Syst. Archit. (2021)
Keyphrases
  • resource constrained
  • access control
  • databases
  • feature extraction
  • software development
  • software systems