Sign in

Methods for Verifying the Security of Available IoT Devices.

Jan FrancistiZoltán BaloghGyörgy MolnárJózsef KopjákGergely SebestyenEniko Nagy
Published in: SISY (2023)
Keyphrases
  • benchmark datasets
  • significant improvement
  • management system
  • data sets
  • mobile devices
  • computational cost
  • machine learning algorithms
  • security mechanisms
  • methods require