In Chapter 1 we took a high-level look at the differences between IoT environments and traditional computing environments. In addition, we examined some of the unique risks and vulnerabilities associated with IoT environments along with the unique discovery and …
CITATION STYLE
Hosmer, C. (2018). Classifying and Modeling IoT Behavior. In Defending IoT Infrastructures with the Raspberry Pi (pp. 17–46). Apress. https://doi.org/10.1007/978-1-4842-3700-7_2
Mendeley helps you to discover research relevant for your work.