Login / Signup

Mass authentication information injection method for effective security management of AMI device.

Taehun KimMuyong HyunMinyong KimSungcheol Kim
Published in: ICTC (2020)
Keyphrases
  • security management
  • ambient intelligence
  • database systems
  • anomaly detection
  • cost effective