Login / Signup
VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime.
Akib Jawad Nafis
Omar Chowdhury
Md. Endadul Hoque
Published in:
CNS (2023)
Keyphrases
</>
management system
optimal policy
big data
artificial intelligence
dynamic programming
network security
management policies
data sets
information systems
cloud computing
key management
privacy policies
global consistency
role based access control
network layer
smart objects