Proceedings of the 6th ACM Workshop on Wearable Systems and Applications 2020
DOI: 10.1145/3396870.3400010
|View full text |Cite
|
Sign up to set email alerts
|

Phy-Ids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Intrusion and anomaly detection approaches were proposed for IoT environments to detect attacks using an attack signature [16] or by learning a pattern of legitimate system activities [17]. These solutions are divided into three parts: acquisition, analysis and alert.…”
Section: B Mitigationmentioning
confidence: 99%
“…Intrusion and anomaly detection approaches were proposed for IoT environments to detect attacks using an attack signature [16] or by learning a pattern of legitimate system activities [17]. These solutions are divided into three parts: acquisition, analysis and alert.…”
Section: B Mitigationmentioning
confidence: 99%