Login / Signup
Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0.
Aintzane Mosteiro-Sanchez
Marc Barcelo
Jasone Astorga
Aitor Urbieta
Published in:
CoRR (2022)
Keyphrases
</>
end to end
identity management
admission control
wireless ad hoc networks
ad hoc networks
congestion control
multipath
key management
content delivery
application layer
high bandwidth
real time
cloud computing
video data