Login / Signup

The Specter of Malicious Computing: Securing the Internet of Things.

Alastair R. BeresfordCecilia MascoloMarco Gruteser
Published in: IEEE Pervasive Comput. (2018)
Keyphrases
  • mobile devices
  • knowledge base
  • ubiquitous computing
  • key technologies
  • physical world
  • database
  • machine learning
  • genetic algorithm
  • search algorithm
  • virtual world
  • malicious behavior