News
Abstract: To cope with the rapid development of the Internet of Things (IoT) and the increasing demand for real-time services, mobile edge computing (MEC) has become a promising solution which extends ...
Abstract: As active network defence systems, honeypots are commonly used as a decoy to inspect attackers and their attack tactics in order to improve the cybersecurity infrastructure of an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results