Similar Items: A systematic literature review on IoT application layer protocol testing and future research directions
- IoT Challenges
- Protocol guided mutation fuzzing to automatically discover vulnerability in commercial IoT devices
- Federated semantic nodes to scale search process in the IoT
- A prototype for updating the “things” in IoT: framework for cybersecurity implementation
- Decision tree based energy aware and delay optimized task offloading in IoT networks
- An energy efficient authentication method for IoT-enabled edge computing using hybrid metaheuristic optimization