Linked e-resources
Details
Table of Contents
1. Introduction
2. System Model for the Internet of Things
3. Vulnerable Features and Threats
4. Securing the Internet of Things
5. Social Governance
6. Case Studies of Selected IoT Deployments
7. Conclusions and Future Work.
2. System Model for the Internet of Things
3. Vulnerable Features and Threats
4. Securing the Internet of Things
5. Social Governance
6. Case Studies of Selected IoT Deployments
7. Conclusions and Future Work.