H Lin, S Garg, J Hu, X Wang, MJ Piran, MS Hossain - 2022 - dl.acm.org
Abstract In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods …