Cargando…
Threat Modeling—How to Visualize Attacks on IOTA?
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of exist...
Autores principales: | Ullah, Ikram, de Roode, Gerard, Meratnia, Nirvana, Havinga, Paul |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7975986/ https://www.ncbi.nlm.nih.gov/pubmed/33800712 http://dx.doi.org/10.3390/s21051834 |
Ejemplares similares
-
Coalition Formation Based Compressive Sensing in Wireless Sensor Networks
por: Masoum, Alireza, et al.
Publicado: (2018) -
Poaching Detection Technologies—A Survey
por: Kamminga, Jacob, et al.
Publicado: (2018) -
Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey
por: Karuppiah Ramachandran, Vignesh Raja, et al.
Publicado: (2016) -
P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA
por: Al Sadi, Amir, et al.
Publicado: (2023) -
Sensing Solutions for Collecting Spatio-Temporal Data for Wildlife Monitoring Applications: A Review
por: Baratchi, Mitra, et al.
Publicado: (2013)