A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System.
Bruno DorsemaineJean-Philippe GaulierJean-Philippe WaryNizar KheirPascal UrienPublished in: ICDCS Workshops (2017)
Keyphrases
- high accuracy
- computational cost
- information systems
- dynamic programming
- fully automatic
- similarity measure
- synthetic data
- detection method
- prior knowledge
- main contribution
- experimental evaluation
- management system
- clustering method
- theoretical analysis
- classification accuracy
- feature space
- preprocessing
- data sets
- computationally efficient
- significant improvement
- optimization algorithm
- detection algorithm
- computational complexity
- high precision
- image segmentation
- optimization method