Skip to main content
TudRepo
Research repository
Education Repository
Cultural Heritage
About
·
How to search
Include full text
Search results
Back
Searched for: subject%3A%22IoT%255C%2BSecurity%22
(1 - 8 of 8)
Document type
Date
List view
Grid view
Print
Email
export CSV
export Excel
Deep Dive into the IoT Backend Ecosystem
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware
PrivGait: An Energy Harvesting-based Privacy-Preserving User Identification System by Gait Analysis
A Comparative Study on Lightweight Authentication Protocols for IoT
RPL Attack Analysis: Evaluation of a Cryptography-Based Sybil Defence in IEEE 802.15.4
User compliance and remediation success after IoT malware notifications
Enhancing Vulnerability Management for IoT Devices with Bug Bounty Programs and Responsible Disclosure
Ethical hacking for boosting IoT vulnerability management: A first look into bug bounty programs and responsible disclosure
Searched for: subject%3A%22IoT%255C%2BSecurity%22
(1 - 8 of 8)
Document type
Date
List view
Grid view
Print
Email
export CSV
export Excel