Login / Signup

Vulnerabilities in IoT Devices, Backends, Applications, and Components.

Rauli KaksonenKimmo HalunenJuha Röning
Published in: ICISSP (2023)
Keyphrases
  • management system
  • data sets
  • mobile devices
  • countermeasures
  • database
  • cloud computing
  • wireless networks
  • smart phones
  • embedded devices
  • smart objects