Internet of things security vulnerabilities and recommended solutions

The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous...

Full description

Saved in:
Bibliographic Details
Main Authors: Olanrewaju, Rashidah Funke, Khan, Burhan ul Islam, Anwar, Farhat, Mir, Roohie Naaz
Format: Article
Language:en
Published: Science Publishing Corporation 2018
Subjects:
Online Access:http://irep.iium.edu.my/70925/1/IJET-23147.pdf
http://irep.iium.edu.my/70925/
https://www.sciencepubco.com/index.php/ijet/article/view/23147
Tags: Add Tag
No Tags, Be the first to tag this record!