Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets.
Kishore AngrishiPublished in: CoRR (2017)
Keyphrases
- big data
- smart objects
- location information
- management system
- mobile computing
- ubiquitous computing
- cloud computing
- future internet
- security mechanisms
- ambient intelligence
- security problems
- mobile devices
- data analysis
- digital data
- internet users
- security issues
- computer networks
- network traffic
- communication technologies
- key management
- data mining
- access control
- remote access
- security risks