Login / Signup
How to footprint, report and remotely secure compromised IoT devices.
Filippo Lauria
Published in:
Netw. Secur. (2017)
Keyphrases
</>
key management
secure manner
cloud computing
management system
mobile devices
security issues
neural network
smart objects
data acquisition
real time
big data
rfid systems
information sharing
data sets
smart phones
personal computer
embedded systems