TY - JOUR KW - architecture KW - authentication KW - Internet of Things KW - security KW - Vulnerabilities AU - Elisaveta Staneva AU - Mariyan Rachev AB -
Securing Internet of Things’ devices has been an ongoing struggle since the technology's recognition. Finding methods to prevent or counter those threats through the experience of the hackers themselves is a promising way of securing these devices. The approach described in this article uses that experience and transforms it into useful models and algorithms for IoT security.
BT - Information & Security: An International Journal DA - 2020 DO - https://doi.org/10.11610/isij.4709 IS - 1 LA - eng N2 -Securing Internet of Things’ devices has been an ongoing struggle since the technology's recognition. Finding methods to prevent or counter those threats through the experience of the hackers themselves is a promising way of securing these devices. The approach described in this article uses that experience and transforms it into useful models and algorithms for IoT security.
PY - 2020 SE - 135 SP - 135 EP - 140 T2 - Information & Security: An International Journal TI - Tactical Approach to Cyber Defence in IoT Computer Networks VL - 47 ER -