Login / Signup

Modelling Buffer-Overflow in 6LoWPAN-Based Resource-Constraint IoT-Healthcare Network.

Himanshu VermaNaveen ChauhanLalit Kumar Awasthi
Published in: Wirel. Pers. Commun. (2023)
Keyphrases
  • buffer overflow
  • security problems
  • management system
  • computer networks
  • peer to peer
  • cloud computing
  • data corruption
  • access control
  • network traffic
  • resource constraints
  • security issues
  • cyber attacks