Similar Items: Protocol guided mutation fuzzing to automatically discover vulnerability in commercial IoT devices
- IoT Challenges
- AI-based cyber risk profiling of public IoT devices in Indonesia with blockchain logging mechanism
- A systematic literature review on IoT application layer protocol testing and future research directions
- Federated semantic nodes to scale search process in the IoT
- A prototype for updating the “things” in IoT: framework for cybersecurity implementation
- Decision tree based energy aware and delay optimized task offloading in IoT networks