Internet of things security vulnerabilities and recommended solutions
The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | en |
| Published: |
Science Publishing Corporation
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/70925/1/IJET-23147.pdf http://irep.iium.edu.my/70925/ https://www.sciencepubco.com/index.php/ijet/article/view/23147 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!
