空洞 发表于 2025-3-30 09:25:26

Information Systems Engineering and Managementhttp://image.papertrans.cn/i/image/476458.jpg

眼界 发表于 2025-3-30 15:02:44

Attacks and Countermeasures in the IoT Layers,In this chapter, we detail the known security flaws, attack vectors, and mitigation strategies applicable to the IoT. We evaluated a large body of prior work in IoT security that takes several forms. We used a three-layer classification system to the existing security concerns facing the IoT and the recommended countermeasures.
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Internet of Things: A Case Study in Africa; Fadele Ayotunde Alaba Book 2024 The Editor(s) (if applicable) and The Author(s), under exclusi