Usage patterns based security attacks for smart devices.
Soumya Kanti DattaChristian BonnetNavid NikaeinPublished in: ICCE-Berlin (2014)
Keyphrases
- usage patterns
- smart devices
- security protocols
- embedded devices
- security mechanisms
- daily life
- web usage mining
- ubiquitous computing
- web mining
- smart phones
- security issues
- information security
- access control
- security requirements
- intrusion detection
- databases
- website
- data analysis
- key management
- machine learning
- response time
- artificial intelligence
- digital images
- watermarking algorithm
- context aware
- data management