Login / Signup
IoT-VuLock: Locking IoT Device Vulnerability with Enhanced Network Scans.
Supanat Limjitti
Hideya Ochiai
Hiroshi Esaki
Kunwadee Sripanidkulchai
Published in:
IMCOM (2019)
Keyphrases
</>
management system
cloud computing
buffer overflow
peer to peer
network structure
communication networks
complex networks
network traffic
computer networks
big data
network model
network architecture
wireless sensor networks
sensor networks
end to end
measurement data
sensor web
network configuration