The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.33140/jmtcm.02.04
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Abstract: Cybercriminals frequently use phishing attempts to trick unwary individuals into disclosing their personal information. The detection of the cybersecurity (CS) state of Internet of Things (IoT) devices determines the necessity to search for and create techniques of detecting various threat types. Thanks to the unification used in the mass manufacture ofIoT devices, it is simpler to make software and hardware modifications in order to prohibit some built-in protection mechanisms from the standpoint of a potenti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 20 publications
(27 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?