Login / Signup
Modelling Buffer-Overflow in 6LoWPAN-Based Resource-Constraint IoT-Healthcare Network.
Himanshu Verma
Naveen Chauhan
Lalit Kumar Awasthi
Published in:
Wirel. Pers. Commun. (2023)
Keyphrases
</>
buffer overflow
security problems
management system
computer networks
peer to peer
cloud computing
data corruption
access control
network traffic
resource constraints
security issues
cyber attacks