Login / Signup
Protection scheme for IoT devices using introspection.
Chulhyun Kang
Fizza Abbas
Heekuck Oh
Published in:
NOF (2015)
Keyphrases
</>
protection scheme
smart objects
mobile devices
operating system
cloud computing
sensor networks
information theoretic
wireless networks