Login / Signup
A new method for vulnerability and risk assessment of IoT.
Ferhat Arat
Sedat Akleylek
Published in:
Comput. Networks (2023)
Keyphrases
</>
risk assessment
databases
real time
decision making
model selection