A security event description of intelligent applications in edge-cloud environment

Abstract In traditional network environment, the attack topology of the network is usually obtained based on a graph traversal algorithm. It uses connection relationships to describe the process of the attack, thus completing the description of network security event. However, in the edge-cloud envi...

Full description

Bibliographic Details
Main Authors: Qianmu Li, Xiaochun Yin, Shunmei Meng, Yaozong Liu, Zijian Ying
Format: Article
Language:English
Published: SpringerOpen 2020-05-01
Series:Journal of Cloud Computing: Advances, Systems and Applications
Subjects:
Online Access:http://link.springer.com/article/10.1186/s13677-020-00171-0