Login / Signup

Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices.

Kisu KimJongsoo LeeWonkang Jung
Published in: MUE/FutureTech (2017)
Keyphrases
  • management system
  • security vulnerabilities
  • access control
  • information loss
  • database
  • end users
  • knowledge discovery
  • peer to peer
  • unauthorized access