C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
A new method for vulnerability and risk assessment of IoT.
Ferhat Arat
Sedat Akleylek
Published in:
Comput. Networks (2023)
Keyphrases
</>
risk assessment
databases
real time
decision making
model selection