A decade of research on patterns and architectures for IoT security.
Tanusan RajmohanPhu Hong NguyenNicolas FerryPublished in: Cybersecur. (2022)
Keyphrases
- security problems
- information security
- management system
- key management
- security threats
- security systems
- security requirements
- security issues
- security policies
- network security
- cloud computing
- access control
- statistical databases
- computer networks
- interesting patterns
- frequent patterns
- previously unknown
- intrusion detection
- malware detection
- data mining