Login / Signup
Mass authentication information injection method for effective security management of AMI device.
Taehun Kim
Muyong Hyun
Minyong Kim
Sungcheol Kim
Published in:
ICTC (2020)
Keyphrases
</>
security management
ambient intelligence
database systems
anomaly detection
cost effective