Login / Signup
Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing.
Ralph Ankele
Stefan Marksteiner
Kai Nahrgang
Heribert Vallant
Published in:
CoRR (2019)
Keyphrases
</>
security analysis
security requirements
high security
security properties
public key
smart card
security vulnerabilities
penetration testing
information security
encryption scheme
network security
authentication protocol
information systems
key management