Abstract
Reporters obtained the following quote from the background information supplied by the inventors:“Computing environments face a range of different types of thr eats. These threats may concern notonly software of the computing environments but also the physical security of the computing environmentsthemselves. Such ph ysical challenges are often magnified in edge computing environments, which aretypically highly distributed and decentralized. Accordingly, there is a need for improved techniques todetect and address physical anomalies in computing envir onments.”