@dblp

Deployment optimization of IoT devices through attack graph analysis.

, , and . WiSec, page 192-202. ACM, (2019)

Links and resources

Tags