Security Vulnerability Assessment of Power IoT based on Business Security.
Jiaxuan FeiKai ChenQigui YaoQian GuoXiangqun WangPublished in: CCRIS (2020)
Keyphrases
- risk assessment
- security problems
- security vulnerabilities
- intrusion detection
- access control
- statistical databases
- security policies
- information systems
- computer security
- key management
- information security
- network security
- security risks
- security issues
- business process
- security threats
- enterprise systems
- buffer overflow
- security level
- data security
- cyber security
- big data
- electronic commerce
- data management