Login / Signup
A Review of IoT Firmware Vulnerabilities and Auditing Techniques.
Taimur Bakhshi
Bogdan Ghita
Ievgeniia Kuzminykh
Published in:
Sensors (2024)
Keyphrases
</>
management system
computer systems
operating system
cloud computing
literature review
learning algorithm
power consumption
information security
big data
security risks
attack graph
relevant literature
online reviews
key management
location information
access control
database systems