Login / Signup
Enhanced Mobile IoT Security Protection Method Based on CPK and Zero Trust.
Ziyi Jia
Wei Wu
Zhe Jia
Xiaopeng Yang
Qiang Wang
Hao Li
Published in:
ICCT (2022)
Keyphrases
</>
preprocessing
experimental evaluation
computational complexity
high accuracy
synthetic data
similarity measure
objective function
dynamic programming
detection method
high precision
data mining
feature selection
significant improvement
computational cost
support vector machine
anomaly detection