S Smys, A Basar, H Wang - Journal of ISMAC, 2020 - scholar.archive.org
… and conventional security models requires more time to process such large amount of data
to identify the threats. Unauthorized access to data for short duration of time is sufficient for a …