Al-Alshaqi, Mohammed and Rawat, Danda (2020) Cloud, Edge, and Fog Computing and Security for the Internet of Things. EAI Endorsed Transactions on Internet of Things.
40893.pdf
Download (1MB)
Abstract
In this paper, a method is purposed that detects the masquerade activity of cloud data. In this method, the combination of the decoy technique and the user’s behaviour profile technique are used to improve the security of data in the cloud. This research has the main focus on understanding th
| Item Type: | Article |
|---|---|
| Date Deposited: | 04 Mar 2026 13:40 |
| Last Modified: | 11 Apr 2026 20:26 |
| URI: | http://eprints.eai.eu/id/eprint/31011 |
