Login / Signup
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms.
Md. Morshed Alam
Md Sajidul Islam Sajid
Weichao Wang
Jinpeng Wei
Published in:
WCNC (2022)
Keyphrases
</>
malicious nodes
security problems
security measures
key exchange protocol
malicious attacks
cyber attacks
key management
denial of service attacks
management system
security vulnerabilities
authentication protocol
security policies
countermeasures
information security
wireless sensor networks
encryption algorithm
fault injection
authentication mechanism
dos attacks
security issues
network security
cloud computing
security requirements
rfid systems
security threats
security management
statistical databases
big data
computer networks
malicious users
directed graph
intrusion detection