HH Kim, J Yoo - Journal of Information Processing Systems, 2022 - jips-k.org
… IoT device system. The results of this study can be used to examine the vulnerabilities of IoT
device systems and evaluate IoT system security… Kim, “Threat-based security analysis for the …