Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems.
Aikaterini RoukounakiSofoklis EfremidisJohn SoldatosJürgen NeisesThomas WalloschkeNikos KefalakisPublished in: GIoTS (2019)
Keyphrases
- end to end
- management system
- big data
- wireless ad hoc networks
- multipath
- scalable video
- admission control
- content delivery
- transport layer
- ad hoc networks
- congestion control
- access control
- key management
- high bandwidth
- web services
- network security
- computer systems
- intrusion detection
- location information
- information security
- internet protocol
- cloud computing