Login / Signup
Vulnerabilities in IoT Devices, Backends, Applications, and Components.
Rauli Kaksonen
Kimmo Halunen
Juha Röning
Published in:
ICISSP (2023)
Keyphrases
</>
management system
data sets
mobile devices
countermeasures
database
cloud computing
wireless networks
smart phones
embedded devices
smart objects