2022
DOI: 10.1007/978-3-031-23020-2_15
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on IoT Vulnerability Discovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Ban et al [19] summarized the typical research methods used in IoT security. Every study that finds a hole in the Internet of Things (IoT) infrastructure was carefully examined using a standard research method.…”
Section: Machine Learning Models In Iomtmentioning
confidence: 99%
“…Ban et al [19] summarized the typical research methods used in IoT security. Every study that finds a hole in the Internet of Things (IoT) infrastructure was carefully examined using a standard research method.…”
Section: Machine Learning Models In Iomtmentioning
confidence: 99%
“…With an increase in IoT vulnerability discovery and exploitation, research into IoT vulnerability detection and mitigation has recently received unprecedented attention. This has resulted in a significant number of published academic articles and survey papers addressing various aspects of IoT security challenges [16][17][18][19][20][21]. In particular, there is a growing body of literature on IoT vulnerability assessment and quantification frameworks.…”
Section: Introductionmentioning
confidence: 99%