Abstract: Nodes in fog computing are easily captured since they are generally resource-constraint and usually work in open and unprotected environments. In this article, a multidimensional trust ...
Abstract: In this article, we attempt to study a problem of identifying outliers from multiple dimensions, terming it as multidimensional anomaly detection. This task assumes that each sample ...