Automatic Verification and Execution of Cyber Attack on IoT Devices.
Fartein Lemjan FærøyMuhammad Mudassar YaminAnkur ShuklaBasel KattPublished in: Sensors (2023)
Keyphrases
- cyber attacks
- cyber security
- cyber defense
- attack detection
- management system
- dos attacks
- countermeasures
- mobile devices
- intrusion detection
- intrusion detection system
- security policies
- cloud computing
- data mining
- ambient intelligence
- embedded systems
- communication systems
- smart grid
- computer systems
- data processing
- e government
- computational intelligence