Login / Signup
The IoT security gap: a look down into the valley between threat models and their implementation.
Peter Aufner
Published in:
Int. J. Inf. Sec. (2020)
Keyphrases
</>
information security
management system
access control
intrusion detection
neural network
security problems
security policies
statistical models
database
privacy preserving
complex systems
statistical model
sensor networks
probabilistic model
efficient implementation
network security
prior knowledge