Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices.
Kuan-Chu LuI-Hsien LiuJia-Wei LiaoShao-Chun WuZong-Chao LiuJung-Shian LiChu-Fen LiPublished in: J. Robotics Netw. Artif. Life (2019)
Keyphrases
- key management
- cyber security
- forensic analysis
- mobile devices
- security problems
- critical infrastructure
- security issues
- small scale
- smart objects
- secret key
- network security
- information security
- intrusion detection
- management system
- control system
- location information
- statistical databases
- ad hoc networks
- resource constrained
- data security
- cyber attacks
- wireless sensor networks
- real time