Showing 1 - 1 of 1
compromised to attack. Naturally, risk analysis emerges, as it is one of many steps to provide a reliable security strategy …. However, the methodologies of any risk analysis must first adapt to the dynamics of the IoT system. This article seeks to shed … devices. Consequently, the importance of these factors in any risk evaluation is highlighted, especially the interdependence …
Persistent link: https://www.econbiz.de/10013365630