Threat Modeling for Communication Security of IoT-Enabled Digital Logistics.
Aisha Kanwal JunejoMichael BrezaJulie A. McCannPublished in: Sensors (2023)
Keyphrases
- security problems
- intrusion detection
- communication networks
- security issues
- management system
- communication protocols
- information processing systems
- mobile devices
- security policies
- statistical databases
- cloud computing
- information security
- resource constrained
- key management
- communication protocol
- secure communication