Sign in

Internet of Things Applications: Opportunities and Threats.

Amir Masoud RahmaniSuleyman BayramovBehnam Kiani Kalejahi
Published in: Wirel. Pers. Commun. (2022)
Keyphrases
  • information security
  • computer security
  • learning algorithm
  • ubiquitous computing
  • key technologies
  • physical world
  • denial of service attacks
  • neural network
  • mobile devices
  • security risks
  • insider attacks