Paper
16 August 2024 An edge computing-based security monitoring method for cross-domain circulation of mobile surveillance data
Songyang Wu, Zhiqi Li, Wen Wang, Lixiang Shen, Ning Li
Author Affiliations +
Proceedings Volume 13230, Third International Conference on Machine Vision, Automatic Identification, and Detection (MVAID 2024); 1323029 (2024) https://doi.org/10.1117/12.3035867
Event: Third International Conference on Machine Vision, Automatic Identification and Detection, 2024, Kunming, China
Abstract
Mobile monitoring methods are easily affected by changes in the coverage cycle of automated monitoring, resulting in poor security monitoring effectiveness. Therefore, it is necessary to design a new security monitoring method based on edge computing for mobile monitoring data to flow across domains., Generate a security monitoring process for cross domain circulation of mobile monitoring data, and use edge computing to build a cross domain circulation security monitoring model for mobile monitoring data, so as to achieve cross domain circulation security monitoring of mobile monitoring data. The experimental results show that the designed mobile monitoring data cross domain circulation security monitoring method has good monitoring effect, reliability, and certain application value, making a certain contribution to reducing the cross domain circulation risk of mobile monitoring data.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Songyang Wu, Zhiqi Li, Wen Wang, Lixiang Shen, and Ning Li "An edge computing-based security monitoring method for cross-domain circulation of mobile surveillance data", Proc. SPIE 13230, Third International Conference on Machine Vision, Automatic Identification, and Detection (MVAID 2024), 1323029 (16 August 2024); https://doi.org/10.1117/12.3035867
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Data modeling

Network security

Surveillance

Data storage

Data processing

Reliability

Back to Top