Articles with "optimal security" as a keyword



Photo from wikipedia

Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2020.3005201

Abstract: A secure execution of offloaded tasks in the 5G-driven mobile edge computing (MEC) deployment is critical for all societal sectors. To realize it, mobile network operators have to intelligently orchestrate virtual resources in multiple cloud… read more here.

Keywords: mobile edge; machine management; edge computing; security ... See more keywords
Photo by scottwebb from unsplash

Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24121727

Abstract: With the rapid development of Industrial Internet of Things technology, the industrial control system (ICS) faces more and more security threats, which may lead to serious risks and extensive damage. Naturally, it is particularly important… read more here.

Keywords: protection; optimal security; security; model ... See more keywords