Login / Signup
Reputation Based Attacker Identification Policy for Multi-Access Edge Computing in Internet of Things.
Yagmur Sabucu
Ali Emre Pusane
Gunes Karabulut Kurt
Francesco Benedetto
Published in:
IEEE Trans. Veh. Technol. (2020)
Keyphrases
</>
access control
key technologies
policy makers
decision making
mobile devices
ubiquitous computing
edge information
trust evaluation
reinforcement learning
multi agent
edge detection
big data