Modeling and Design of Secure Internet of Things 2020
DOI: 10.1002/9781119593386.ch18
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Defense Against Security Threats on IoT Hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…In addition to having sufficient knowledge of malware, exploits and network protocols, they need to be able to navigate the vast quantities of data, including logs, metadata, and packet capture (PCAP) data. Proactive defence has received a research focus in recent years [2] [3].…”
Section: Introductionmentioning
confidence: 99%
“…In addition to having sufficient knowledge of malware, exploits and network protocols, they need to be able to navigate the vast quantities of data, including logs, metadata, and packet capture (PCAP) data. Proactive defence has received a research focus in recent years [2] [3].…”
Section: Introductionmentioning
confidence: 99%