Terminal Security Reinforcement Method based on Graph and Potential Function

2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)(2021)

引用 1|浏览0
暂无评分
摘要
By taking advantages of graphs and potential functions, a security reinforcement method for edge computing terminals is proposed in this paper. A risk graph of the terminal security protection system is constructed, and importance of the security protection and risks of the terminals is evaluated according to the topological potential of the graph nodes, and the weak points of the terminal are loc...
更多
查看译文
关键词
n/a
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要