Security and Vulnerability of Extreme Automation Systems: The IoMT and IoA Case Studies.
Jinan FiaidhiSabah MohammedPublished in: IT Prof. (2019)
Keyphrases
- case study
- security vulnerabilities
- lessons learned
- risk assessment
- information security
- open source
- buffer overflow
- security risks
- security policies
- penetration testing
- decision making
- intrusion detection
- security issues
- statistical databases
- data security
- computer security
- security requirements
- network security
- real world
- database
- security model
- denial of service
- knowledge management
- cryptographic protocols
- security management
- development process
- information assurance