Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Philipp PützRichard MitevMarkus MiettinenAhmad-Reza SadeghiPublished in: ACSAC (2023)
Keyphrases
- information security
- security issues
- access control
- security problems
- security breaches
- security services
- management system
- security vulnerabilities
- security threats
- cyber attacks
- computer security
- key management
- cyber security
- security measures
- privacy issues
- countermeasures
- malicious attacks
- inference control
- national security
- statistical databases
- design patterns
- denial of service attacks
- software engineering
- storage area network
- risk analysis
- information systems
- insider attacks
- protection mechanisms
- buffer overflow
- security management
- security requirements
- security mechanisms