IoT Security Using Deception - Measuring Improved Risk Posture.
David WeissmanPublished in: WF-IoT (2020)
Keyphrases
- risk assessment
- security problems
- risk analysis
- key management
- management system
- security issues
- risk management
- network security
- incomplete information
- intrusion detection
- data mining
- human body
- risk factors
- security requirements
- high risk
- access control
- computer security
- intrusion detection system
- information security
- qualitative and quantitative
- wireless networks
- security policies
- resource constrained
- anomaly detection
- decision making