Login / Signup
Modified graph-based algorithm to analyze security threats in IoT.
Ferhat Arat
Sedat Akleylek
Published in:
PeerJ Comput. Sci. (2023)
Keyphrases
</>
security threats
graph based algorithm
key management
security issues
security mechanisms
cloud computing
wireless sensor networks
data mining
information security
information systems
matching algorithm