Login / Signup
Methods for Verifying the Security of Available IoT Devices.
Jan Francisti
Zoltán Balogh
György Molnár
József Kopják
Gergely Sebestyen
Eniko Nagy
Published in:
SISY (2023)
Keyphrases
</>
benchmark datasets
significant improvement
management system
data sets
mobile devices
computational cost
machine learning algorithms
security mechanisms
methods require