Sign Up to like & get
recommendations!
1
Published in 2020 at "Applied Sciences"
DOI: 10.3390/app10114015
Abstract: At present, embedded devices have become a part of people’s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stateful;…
read more here.
Keywords:
front end;
embedded devices;
web front;
communication ... See more keywords