A security event description of intelligent applications in edge-cloud environment
Abstract In traditional network environment, the attack topology of the network is usually obtained based on a graph traversal algorithm. It uses connection relationships to describe the process of the attack, thus completing the description of network security event. However, in the edge-cloud envi...
Main Authors: | Qianmu Li, Xiaochun Yin, Shunmei Meng, Yaozong Liu, Zijian Ying |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2020-05-01
|
Series: | Journal of Cloud Computing: Advances, Systems and Applications |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s13677-020-00171-0 |
Similar Items
-
Performance Evaluation of Discrete Event Systems with GPenSIM
by: Reggie Davidrajuh, et al.
Published: (2018-01-01) -
Overview of Opacity in Discrete Event Systems
by: Ye Guo, et al.
Published: (2020-01-01) -
A New Modular Petri Net for Modeling Large Discrete-Event Systems: A Proposal Based on the Literature Study
by: Reggie Davidrajuh
Published: (2019-11-01) -
On Process Model Synthesis Based on Event Logs with Noise
by: A. A. Mitsyuk, et al.
Published: (2014-08-01) -
Test and diagnosis of discrete event systems using Petri nets
by: Pocci, Marco
Published: (2013)