Published in

Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection, 2020

DOI: 10.1561/9781680836837.ch5

Links

Tools

Export citation

Search in Google Scholar

5. IoT Network Risk Assessment and Mitigation: The SerIoT Approach

This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Green circle
Preprint: archiving allowed
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO