Modified graph-based algorithm to analyze security threats in IoT

In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, s...

Full description

Saved in:
Bibliographic Details
Published in:PeerJ. Computer science Vol. 9; p. e1743
Main Authors: Arat, Ferhat, Akleylek, Sedat
Format: Journal Article
Language:English
Published: United States PeerJ. Ltd 08.12.2023
PeerJ, Inc
PeerJ Inc
Subjects:
ISSN:2376-5992, 2376-5992
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first