Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3163469
Abstract: Data exfiltration relies primarily on network protocols for unauthorized data transfers from information systems. In addition to well-established Internet protocols (such as DNS, ICMP, or NTP, among others), adversaries can use newer protocols such as…
read more here.
Keywords:
iot protocols;
exfiltrate data;
iot;
protocol ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Energies"
DOI: 10.3390/en13112762
Abstract: Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects…
read more here.
Keywords:
communication;
iot protocol;
iot protocols;
smart grid ... See more keywords