Resource-aware Security Configuration for Constrained IoT Devices.
Marten FischerRalf TönjesPublished in: Q2SWinet (2023)
Keyphrases
- security problems
- security issues
- key management
- security requirements
- cloud computing
- intrusion detection
- network security
- smart objects
- management system
- security systems
- rfid systems
- statistical databases
- computer networks
- access control
- network services
- security management
- security mechanisms
- security policies
- security protocols
- security measures
- wireless sensor
- functional requirements
- data security
- neural network
- context aware
- mobile devices