Login / Signup
The State of Embedded-Device Security (Spoiler Alert: It's Bad).
John Viega
Hugh Thompson
Published in:
IEEE Secur. Priv. (2012)
Keyphrases
</>
real time
information systems
security requirements
social networks
network security
neural network
access control
intrusion detection
information security
security policies
security issues