Computing Security Scores for IoT Device Vulnerabilities.
Syed RizviNicholas McIntyreJungwoo RyooPublished in: ICSSA (2019)
Keyphrases
- information security
- security issues
- security vulnerabilities
- security problems
- security mechanisms
- security risks
- cloud computing
- buffer overflow
- network security
- management system
- security breaches
- key management
- access control
- sensitive data
- security requirements
- countermeasures
- intrusion detection
- security analysis
- computer networks
- security flaws
- cyber attacks
- security patterns
- smart card
- computer security
- rfid tags
- rfid systems
- security threats
- virtual private network