Login / Signup
Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices.
Kisu Kim
Jongsoo Lee
Wonkang Jung
Published in:
MUE/FutureTech (2017)
Keyphrases
</>
management system
security vulnerabilities
access control
information loss
database
end users
knowledge discovery
peer to peer
unauthorized access