Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features.
Inam UllahAsra NoorShah NazirFarhad AliYazeed Yasin GhadiNida AslamPublished in: J. Supercomput. (2024)
Keyphrases
- decision making
- security problems
- security mechanisms
- feature vectors
- security protocols
- computer security
- countermeasures
- protection mechanisms
- security threats
- java card
- decision makers
- management system
- feature extraction
- fault injection
- malicious attacks
- data mining
- security risks
- chosen plaintext
- cryptographic protocols
- key management
- security issues
- access control
- feature set