Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Philipp PützRichard MitevMarkus MiettinenAhmad-Reza SadeghiPublished in: CoRR (2023)
Keyphrases
- information security
- security issues
- access control
- security threats
- security breaches
- security measures
- computer security
- cyber attacks
- security problems
- key management
- privacy issues
- security vulnerabilities
- countermeasures
- national security
- case study
- security services
- information systems
- network security
- intrusion detection
- security policies
- security risks
- management system
- protection mechanisms
- security systems
- intrusion detection system
- inference control
- computer networks