Optimized Monitoring and Detection of Internet of Things resources-constraints Cyber Attacks

A Waisi, Z Ali - 2023 - e-theses.imtlucca.it
This research takes place in the context of the optimized monitoring and detec-tion of
Internet of Things (IoT) resource-constraints attacks. Meanwhile, the In-ternet of Everything …

Optimized Monitoring and Detection of Internet of Things resources-constraints Cyber Attacks

A Waisi, Z Ali - 2023 - e-theses.imtlucca.it
This research takes place in the context of the optimized monitoring and detec-tion of
Internet of Things (IoT) resource-constraints attacks. Meanwhile, the In-ternet of Everything …