Login / Signup
Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards.
Anna Maria Mandalari
Hamed Haddadi
Daniel J. Dubois
David R. Choffnes
Published in:
CoRR (2023)
Keyphrases
</>
detection method
detection algorithm
detection accuracy
automatic detection
false alarms
false positives
detection rate
neural network
management system
anomaly detection
object detection
event detection
data sets
computer vision
case study