• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Reputation Based Attacker Identification Policy for Multi-Access Edge Computing in Internet of Things.

Yagmur SabucuAli Emre PusaneGunes Karabulut KurtFrancesco Benedetto
Published in: IEEE Trans. Veh. Technol. (2020)
Keyphrases
  • access control
  • key technologies
  • policy makers
  • decision making
  • mobile devices
  • ubiquitous computing
  • edge information
  • trust evaluation
  • reinforcement learning
  • multi agent
  • edge detection
  • big data