Cargando…

Threat Modeling—How to Visualize Attacks on IOTA?

Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of exist...

Descripción completa

Detalles Bibliográficos
Autores principales: Ullah, Ikram, de Roode, Gerard, Meratnia, Nirvana, Havinga, Paul
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7975986/
https://www.ncbi.nlm.nih.gov/pubmed/33800712
http://dx.doi.org/10.3390/s21051834