Login / Signup
Edge2Guard: Botnet Attacks Detecting Offline Models for Resource-Constrained IoT Devices.
Bharath Sudharsan
Dineshkumar Sundaram
Pankesh Patel
John G. Breslin
Muhammad Intizar Ali
Published in:
PerCom Workshops (2021)
Keyphrases
</>
resource constrained
security mechanisms
sensor networks
resource constraints
genetic algorithm
key management
mobile devices
visual sensor networks
data sets
multipath
data streams
ddos attacks
denial of service attacks