Sign Up to like & get
recommendations!
1
Published in 2022 at "F1000Research"
DOI: 10.12688/f1000research.127732.1
Abstract: While the benefits of IoT cannot be overstated, its computational constraints make it challenging to deploy security methodologies that have been deployed in traditional computing systems. The benefits and computational constraints have made IoT systems…
read more here.
Keywords:
machine learning;
achieving lightweight;
intrusion;
iot systems ... See more keywords