×
Mar 11, 2019 · As the meaning of the IoT implies, the more devices that are connected to the network, the greater the number of network-based security attacks.
Examining potential security threats in the IoT environment is examined and a security design and the development of an intelligent security framework ...
Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security ...
JaeSeung Lee, Jungho Kang , Moon-Seog Jun, Jaekyung Han: Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment.
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment. Symmetry 2019, 11, 361. https://doi.org/10.3390/sym11030361.
JaeSeung Lee, Jungho Kang , Moon-Seog Jun, Jaekyung Han: Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment.
Jaeseung Lee's 3 research works with 10 citations, including: Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT ...
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment · Computer Science, Engineering. Symmetry · 2019.
People also ask
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment. Lee, Jaeseung; Kang, Jungho; Jun, Moon-seog ...
The symmetry-adapted machine-learning approach can support an effective way to deal with the dynamic nature of security attacks by the extraction and analysis ...