Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection.
Huseyn HuseynovTarek N. SaadawiKenichi KouraiPublished in: Big Data Cogn. Comput. (2021)
Keyphrases
- bio inspired
- access control
- swarm intelligence
- hybrid intelligent systems
- artificial neural networks
- modular neural networks
- neural models
- intrusion detection
- role based access control
- image analysis and pattern recognition
- low level image processing
- information security
- security policies
- factor authentication
- access requests
- edge detection
- input image
- image analysis
- image segmentation
- genetic algorithm
- machine learning
- database