no code implementations • 3 Dec 2020 • Vaishali Kansal, Mayank Dave
This approach is effective as it uses the advantage of both MTD technique and Fog computing paradigm supporting cloud environment.
Cryptography and Security