A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications.
Abbas M. Al-GhailiSaraswathy Shamini GunasekaranNorziana JamilZaid Abdi Alkareem AlyasseriNaif Mohammed Al-HadaZul-Azri Bin IbrahimAsmidar Abu BakarHairoladenan KasimEghbal HosseiniRidha OmarRafiziana Md. KasmaniRina Azlin RazaliPublished in: IEEE Access (2023)
Keyphrases
- security problems
- key management
- information security
- management system
- security issues
- access control
- security requirements
- security policies
- role based access control
- security mechanisms
- information assurance
- access control systems
- security properties
- security systems
- data security
- computer security
- data sets
- intrusion detection
- information systems
- neural network
- security model
- sensor networks