Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Communications Magazine"
DOI: 10.1109/mcom.2018.1701270
Abstract: The evolution and sophistication of cyber-attacks need resilient and evolving cybersecurity schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and threats from the IT environment despite the existence of a layered…
read more here.
Keywords:
leveraging lstm;
detection;
fog things;
lstm networks ... See more keywords