Best Practices for IoT Security: What Does That Even Mean?
Christopher BellmanPaul C. van OorschotPublished in: CoRR (2020)
Keyphrases
- security problems
- key management
- information security
- access control
- management system
- network security
- computer security
- security issues
- intrusion detection
- security properties
- security requirements
- case study
- data security
- malware detection
- functional requirements
- security model
- security threats
- security mechanisms
- location information
- statistical databases
- ad hoc networks
- database design
- software engineering
- security management
- security vulnerabilities
- information assurance