Sign in

Security Analysis of IoT Systems Using Attack Trees.

Delphine BeaulatonNajah Ben SaidIoana CristescuSalah Sadou
Published in: GraMSec@CSF (2019)
Keyphrases
  • security analysis
  • management system
  • authentication protocol
  • distributed systems
  • data structure
  • security requirements
  • image encryption
  • high security
  • information systems
  • image quality
  • computer systems
  • smart card