Real Time Implementation of Terminal Security Policies Selection Based on Edge Computing

[1]  Muttukrishnan Rajarajan,et al.  PIndroid: A novel Android malware detection system using ensemble learning , 2017 .

[2]  Hong Wen,et al.  A model divides the mobile security level based on SVM , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[3]  Yushan Li,et al.  Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.

[4]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[5]  Hong Wen,et al.  Lightweight one-time password authentication scheme based on radio-frequency fingerprinting , 2018, IET Commun..

[6]  Ming Xiao,et al.  Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions , 2018, IEEE Industrial Electronics Magazine.

[7]  Hong Wen,et al.  Physical layer assist authentication technique for smart meter system , 2013, IET Commun..

[8]  Hong Wen,et al.  Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.

[9]  Yan Dong,et al.  PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[10]  Hong Wen,et al.  Internet of Things Based Smart Grids Supported by Intelligent Edge Computing , 2019, IEEE Access.

[11]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.