Water-Tight IoT-Just Add Security.
Guillaume BourCamillo BoscoRita Maria UgarelliMartin Gilje JaatunPublished in: J. Cybersecur. Priv. (2023)
Keyphrases
- security problems
- key management
- management system
- information security
- lower bound
- upper bound
- access control
- security policies
- security requirements
- cloud computing
- security issues
- neural network
- security management
- security systems
- data security
- security mechanisms
- intrusion detection
- statistical databases
- security analysis
- worst case
- database systems
- rfid systems
- big data
- computer security
- distributed systems
- security model
- cyber attacks
- database