共 47 条
[1]
An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things
[J].
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019),
2018,
:83-87
[6]
Cao RR., 2020, CYBERSPACE SECURITY, V11, P70
[7]
Chathoth A.K., 2021, FEDERATED INTRUSION
[8]
Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing
[J].
2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD),
2016,
:273-278
[9]
Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry
[J].
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS),
2015,
:1332-1337
[10]
Performance and Power Analysis of High-Density Multi-GPGPU Architectures: A Preliminary Case Study
[J].
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS),
2015,
:66-71