Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation.
Jay JemalKevin T. KornegayPublished in: CISS (2019)
Keyphrases
- security problems
- key management
- computer networks
- information security
- management system
- security issues
- risk assessment
- security requirements
- multimedia
- network security
- social networks
- access control
- intrusion detection
- data security
- database systems
- data sources
- resource constrained
- security mechanisms
- statistical databases
- varying degrees
- security analysis
- security policies
- network topologies
- cyber attacks
- network structure