Vulnerability Detection in IoT Firmware: A Survey.
Wei XieYikun JiangYong TangNing DingYuanming GaoPublished in: ICPADS (2017)
Keyphrases
- automatic detection
- object detection
- management system
- operating system
- detection scheme
- false positives
- detection method
- cloud computing
- detection algorithm
- information retrieval
- detection accuracy
- false alarms
- artificial intelligence
- anomaly detection
- social media
- data analysis
- power consumption
- database systems
- decision making
- data sets