A study on the management structure of vulnerability information in iot environment

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to the recent development of wireless network technologies, the use of IoT devices is increasing as well as security threats caused by vulnerable security. To prevent security threats and accidents, it is necessary to share information on cyber security threats. This paper proposes a platform of sharing vulnerability information regarding IoT devices, and contents of shared information.

Cite

CITATION STYLE

APA

Ko, E., Kim, T., & Kim, H. (2017). A study on the management structure of vulnerability information in iot environment. In Lecture Notes in Electrical Engineering (Vol. 448, pp. 247–251). Springer Verlag. https://doi.org/10.1007/978-981-10-5041-1_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free