Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
IoT devices which include wireless sensors, software, actuators, and computer devices operated through the Internet, enable the transfer of data among objects or people automatically without human intervention. Since these devices are resource constraint embedded devices, security policies are not i...
| Published in: | Journal of King Saud University: Computer and Information Sciences |
|---|---|
| Main Authors: | , , |
| Format: | Article |
| Language: | English |
| Published: |
Springer
2022-11-01
|
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S1319157821003621 |
