Using Redundancy to Detect Security Anomalies: Towards IoT security attack detectors: The Internet of Things (Ubiquity symposium).
Roopak VenkatakrishnanMladen A. VoukPublished in: Ubiquity (2016)
Keyphrases
- intrusion detection
- cyber attacks
- security vulnerabilities
- information security
- network attacks
- security measures
- network security
- security issues
- anomaly detection
- security problems
- key management
- statistical databases
- security policies
- computer security
- cyber security
- normal behavior
- security management
- access control
- security mechanisms
- malware detection
- security threats
- java card
- intrusion detection system
- smart card
- denial of service attacks
- security risks
- computer networks
- big data
- management system
- countermeasures