Login / Signup
A First Step Towards Understanding Real-world Attacks on IoT Devices.
Armin Ziaie Tabari
Xinming Ou
Published in:
CoRR (2020)
Keyphrases
</>
real world
post processing
case study
management system
attack detection
malicious attacks
security problems
synthetic data
mobile devices
neural network
web services
data sets
lightweight
data analysis
wide range
big data
embedded systems
security mechanisms
data mining