Metaverse: Survey, Applications, Security, and Opportunities.
Jiayi SunWensheng GanHan-Chieh ChaoPhilip S. YuPublished in: CoRR (2022)
Keyphrases
- information security
- access control
- information assurance
- network security
- security analysis
- computer security
- security requirements
- statistical databases
- intrusion detection
- security problems
- security issues
- authentication protocol
- encryption scheme
- real time
- security threats
- security level
- security model
- neural network
- search engine
- data collection
- case study
- sensor networks
- database
- distributed systems
- computer systems