Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach.
Ryan WilliamsEmma McMahonSagar SamtaniMark W. PattonHsinchun ChenPublished in: ISI (2017)
Keyphrases
- smart objects
- mobile devices
- big data
- physical world
- mobile computing
- location information
- management system
- ubiquitous computing
- ambient intelligence
- everyday objects
- key technologies
- information security
- multi user
- electronic commerce
- countermeasures
- web scale
- embedded systems
- smart phones
- cloud computing
- highly scalable
- consumer behavior
- open source