Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center.
William Eduardo Villegas-Ch.Joselin García-OrtizPublished in: Frontiers Big Data (2024)
Keyphrases
- monitoring system
- data center
- artificial intelligence
- cloud infrastructure
- access control
- cloud computing
- security requirements
- safe operation
- business continuity
- authentication protocol
- user authentication
- energy efficiency
- cost effective
- mission critical
- security analysis
- data acquisition
- virtual machine
- energy consumption
- security issues
- homeland security
- power consumption
- field bus
- health monitoring
- information security
- intelligent systems
- heterogeneous wireless sensor networks
- smart card
- computational intelligence
- cloud storage
- intrusion detection
- data mining
- database