Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks.
Mohamed AbomharaGeir M. KøienPublished in: J. Cyber Secur. Mobil. (2015)
Keyphrases
- cyber security
- intrusion detection system
- security breaches
- attack scenarios
- cyber attacks
- intrusion detection
- security issues
- security vulnerabilities
- countermeasures
- information security
- network security
- attack detection
- security mechanisms
- smart grid
- alert correlation
- security threats
- anomaly detection
- critical infrastructure
- security risks
- computer networks
- network traffic
- denial of service attacks
- mobile devices
- computer systems
- telecommunication systems
- ubiquitous computing
- privacy preserving
- data mining techniques
- cyber crime
- data mining
- visual analytics
- context aware
- computational intelligence
- sql injection