Multiple access control-based joint vertical boundary defense technique for malicious code intrusion in power IoT
Crossref DOI link: https://doi.org/10.1007/s10791-025-09781-1
Published Online: 2025-11-24
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Wang, Jiayi
Lu, Wenda
Jia, Zhifang
Text and Data Mining valid from 2025-11-24
Version of Record valid from 2025-11-24
Article History
Received: 15 April 2025
Accepted: 31 October 2025
First Online: 24 November 2025
Declarations
:
: Not applicable.
: The authors declare no competing interests.