Login / Signup

The State of Embedded-Device Security (Spoiler Alert: It's Bad).

John ViegaHugh Thompson
Published in: IEEE Secur. Priv. (2012)
Keyphrases
  • real time
  • information systems
  • security requirements
  • social networks
  • network security
  • neural network
  • access control
  • intrusion detection
  • information security
  • security policies
  • security issues