Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cloud edge cooperative attack recognition based on CNN
by
Zhang, Xibo
, Zhang, Yan
, Ju, Xiaoming
, Ran, Qingwen
2020
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cloud edge cooperative attack recognition based on CNN
by
Zhang, Xibo
, Zhang, Yan
, Ju, Xiaoming
, Ran, Qingwen
2020
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Cloud edge cooperative attack recognition based on CNN
2020
Request Book From Autostore
and Choose the Collection Method
Overview
In recent years, the concept of cloud edge collaboration has been proposed, which uses some operations of edge and cloud to complete all kinds of collaboration, and has produced various applications in various fields. CNN is one of the hot spots of scientific research, and has excellent performance in the field of image voice. In view of these advantages, combined with the cooperation of CNN and cloud edge, this paper proposes cloud edge collaborative attack recognition based on CNN. The attack recognition model is trained by using CNN and open source data set, and cloud edge collaboration is realized by data and model transmission between edge and cloud. This method realizes the security collaboration between the cloud and the edge, and reduces the resource pressure of the cloud. At the same time, the cooperation of multiple edge ends increases the security identification ability of the cloud and improves the security coordination between the cloud and the edge.
Publisher
IOP Publishing
MBRLCatalogueRelatedBooks
Related Items
Related Items
We currently cannot retrieve any items related to this title. Kindly check back at a later time.
This website uses cookies to ensure you get the best experience on our website.