News

Abstract: To cope with the rapid development of the Internet of Things (IoT) and the increasing demand for real-time services, mobile edge computing (MEC) has become a promising solution which extends ...
Abstract: As active network defence systems, honeypots are commonly used as a decoy to inspect attackers and their attack tactics in order to improve the cybersecurity infrastructure of an ...