Scanning for vulnerable devices in the Internet of Things.
Linda MarkowskyGeorge MarkowskyPublished in: IDAACS (2015)
Keyphrases
- mobile devices
- physical world
- smart phones
- key technologies
- smart objects
- scan data
- embedded devices
- mobile learning
- case study
- mobile computing
- mobile applications
- personal computer
- database
- mobile phone
- location information
- embedded systems
- intelligent environments
- learning environment
- pervasive computing
- processing capabilities
- handheld devices
- context aware
- information systems
- neural network