Abstract: Nodes in fog computing are easily captured since they are generally resource-constraint and usually work in open and unprotected environments. In this article, a multidimensional trust ...
Abstract: In this article, we attempt to study a problem of identifying outliers from multiple dimensions, terming it as multidimensional anomaly detection. This task assumes that each sample ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results