Login / Signup

Reputation Based Attacker Identification Policy for Multi-Access Edge Computing in Internet of Things.

Yagmur SabucuAli Emre PusaneGunes Karabulut KurtFrancesco Benedetto
Published in: IEEE Trans. Veh. Technol. (2020)
Keyphrases
  • access control
  • key technologies
  • policy makers
  • decision making
  • mobile devices
  • ubiquitous computing
  • edge information
  • trust evaluation
  • reinforcement learning
  • multi agent
  • edge detection
  • big data