Login / Signup
Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing.
Ralph Ankele
Stefan Marksteiner
Kai Nahrgang
Heribert Vallant
Published in:
ARES (2019)
Keyphrases
</>
security analysis
security requirements
high security
penetration testing
security properties
information security
public key
authentication protocol
security vulnerabilities
intrusion detection
user authentication
smart card
encryption scheme
private key
key management
rfid systems
information systems
data mining