2022
DOI: 10.1007/s13198-021-01533-w
|View full text |Cite
|
Sign up to set email alerts
|

Security threat model under internet of things using deep learning and edge analysis of cyberspace governance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 22 publications
0
0
0
Order By: Relevance
“…Rather than directly targeting a specific organization, supply chain attacks compromise trusted software or hardware suppliers to gain unauthorized access to their customers' systems. This approach can have widespread and far-reaching impacts [47].…”
Section: Figure 1 Classifications Of Cyber-attacks [44]mentioning
confidence: 99%
“…Rather than directly targeting a specific organization, supply chain attacks compromise trusted software or hardware suppliers to gain unauthorized access to their customers' systems. This approach can have widespread and far-reaching impacts [47].…”
Section: Figure 1 Classifications Of Cyber-attacks [44]mentioning
confidence: 99%
“…As a result, researchers have been searching for solutions to address fairness in networks. Li et al proposed an IoT security threat model that uses deep learning to create a fair environment by autonomously learning from attacks [14]. Additionally, Hu et al discussed the vulnerability of trust relationships between network nodes and introduced a blockchain-based software-defined network architecture that rewards nodes based on contract theory to achieve fairness [15].…”
Section: State Of the Artmentioning
confidence: 99%