Sign in

Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT).

Mark W. PattonEric GrossRyan ChinnSamantha ForbisLeon WalkerHsinchun Chen
Published in: JISIC (2014)
Keyphrases
  • mobile devices
  • empirical studies
  • artificial intelligence
  • real time
  • data mining
  • decision making
  • learning environment
  • management system
  • experimental study