Login / Signup
Detecting compromised IoT devices: Existing techniques, challenges, and a way forward.
Imran Makhdoom
Mehran Abolhasan
Daniel Robert Franklin
Justin Lipman
Christian Zimmermann
Massimo Piccardi
Negin Shariati
Published in:
Comput. Secur. (2023)
Keyphrases
</>
lessons learned
management system
security problems
mobile devices
real world
bi directional
key issues
embedded devices
neural network
cloud computing
information technology
automatic detection
website
mobile computing
information retrieval
forward and backward
mobile platforms