Internet of things security: A top-down survey.
Djamel Eddine KouicemAbdelmadjid BouabdallahHicham LakhlefPublished in: Comput. Networks (2018)
Keyphrases
- information security
- high level
- security policies
- security issues
- information assurance
- mobile devices
- intrusion detection
- computer security
- security management
- security threats
- statistical databases
- security requirements
- data mining
- security problems
- security systems
- rfid technology
- key management
- mobile computing
- key technologies
- data collection
- functional requirements
- literature review
- ubiquitous computing
- database