Survey of IoT security research: threats, detection and defense
Based on the IoT security literatures published in the international conferences on network security (ACM CCS, USENIX Security, NDSS, IEEE S&P) in recent five years, and other prominent researches, the works from the perspective of "threat, detection, defense" were systematically summa...
Saved in:
Main Authors: | Yiyu YANG, Wei ZHOU, Shangru ZHAO, Cong LIU, Yuhui ZHANG, He WANG, Wenjie WANG, Yuqing ZHANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021124/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Deep learning for cyber threat detection in IoT networks: A review
by: Alyazia Aldhaheri, et al.
Published: (2024-01-01) -
Knowledge graph based ubiquitous power IoT security visualization technology
by: Yang YU, et al.
Published: (2019-11-01) -
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
by: GU Tiansheng, et al.
Published: (2024-12-01) -
New developing narrow band IoT technology NB-IoT
by: Zhi-bin ZHENG, et al.
Published: (2017-12-01) -
Internet of Things (IoT) technologies: features, development prospects and potential threats
by: Daria Margaza, et al.
Published: (2024-11-01)