Placement optimization of IoT security solutions for edge computing based on graph theory.
Tanguy GodquinMorgan BarbierChrystel GaberJean-Luc GrimaultJean-Marie Le BarsPublished in: IPCCC (2019)
Keyphrases
- graph theory
- graph theoretical
- combinatorial optimization
- computer vision and pattern recognition
- complex networks
- graph theoretic
- security problems
- optimal placement
- graph based representations
- social network analysis
- information security
- document similarity
- key management
- intrusion detection
- access control
- optimization criteria
- optimization problems
- management system
- automata theory
- graph representations
- security issues
- maximal cliques
- edge detection
- protein structure prediction
- security requirements
- computer vision
- weighted graph
- metaheuristic
- evolutionary algorithm
- optimal solution