Login / Signup
Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design.
João B. F. Sequeiros
Francisco T. Chimuco
Musa G. Samaila
Mário M. Freire
Pedro R. M. Inácio
Published in:
ACM Comput. Surv. (2020)
Keyphrases
</>
cloud computing
functional requirements
mobile phone
design process
mobile computing
security problems
security vulnerabilities
mobile devices
management system
access control
big data
authentication protocol
cyber attacks
security measures
malicious users