Login / Signup
A Look into the Vulnerability of Voice Assisted IoT.
Raghunath Maji
Atreyee Biswas
Rituparna Chaki
Published in:
CISIM (2022)
Keyphrases
</>
management system
risk assessment
cloud computing
big data
location information
text to speech
real time
data mining
mobile computing
emotion recognition
data sets
website
decision trees
security risks
voice and data services