Designing for Security Within and Between IoT Devices.
Mike BorowczakRafer CooleyShaya WolfPublished in: ISVLSI (2018)
Keyphrases
- security problems
- security issues
- security requirements
- mobile agent system
- access control
- key management
- information security
- management system
- security threats
- intrusion detection
- security mechanisms
- mobile devices
- data security
- computer security
- statistical databases
- security policies
- network security
- security systems
- network services
- big data
- security analysis
- embedded systems
- wireless sensor
- cyber attacks
- cloud computing
- neural network
- security measures
- smart objects
- information assurance