Login / Signup
Towards System-Level Security Analysis of IoT Using Attack Graphs.
Zheng Fang
Hao Fu
Tianbo Gu
Pengfei Hu
Jinyue Song
Trent Jaeger
Prasant Mohapatra
Published in:
IEEE Trans. Mob. Comput. (2024)
Keyphrases
</>
security analysis
attack graphs
smart card
public key
security requirements
security properties
encryption scheme
data mining
authentication protocol
user authentication
attack graph
neural network
distributed environment
key management
security vulnerabilities