Login / Signup
An Overview of UPnP-based IoT Security: Threats, Vulnerabilities, and Prospective Solutions.
Golam Kayas
Md. Mahmud Hossain
Jamie Payton
S. M. Riazul Islam
Published in:
CoRR (2020)
Keyphrases
</>
security threats
security issues
security risks
security mechanisms
key management
cloud computing
management system
smart card
information security
resource constrained
data mining
security measures
real time
computer systems
security requirements