Understanding IoT Security: A Point-by-point Investigation of IoT Weaknesses and a First Exact Glance at Web Scale IoT Exploits.
Resource URI: https://dblp.l3s.de/d2r/resource/publications/conf/ic3i/RajputUSTSC22
Home
|
Example Publications
Property
Value
dcterms:
bibliographicCitation
<
http://dblp.uni-trier.de/rec/bibtex/conf/ic3i/RajputUSTSC22
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/C._P._Sanjay
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Lalit_Thakur
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Maddikera_Kalyan_Chakravarthi
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/R._Umamageswari
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Rajesh_Singh_0001
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Swati_Kiran_Rajput
>
foaf:
homepage
<
http://dx.doi.org/doi.org%2F10.1109%2FIC3I56241.2022.10073056
>
foaf:
homepage
<
https://doi.org/10.1109/IC3I56241.2022.10073056
>
dc:
identifier
DBLP conf/ic3i/RajputUSTSC22
(xsd:string)
dc:
identifier
DOI doi.org%2F10.1109%2FIC3I56241.2022.10073056
(xsd:string)
dcterms:
issued
2022
(xsd:gYear)
rdfs:
label
Understanding IoT Security: A Point-by-point Investigation of IoT Weaknesses and a First Exact Glance at Web Scale IoT Exploits.
(xsd:string)
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/C._P._Sanjay
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Lalit_Thakur
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Maddikera_Kalyan_Chakravarthi
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/R._Umamageswari
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Rajesh_Singh_0001
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Swati_Kiran_Rajput
>
swrc:
pages
1677-1683
(xsd:string)
dcterms:
partOf
<
https://dblp.l3s.de/d2r/resource/publications/conf/ic3i/2022
>
owl:
sameAs
<
http://bibsonomy.org/uri/bibtexkey/conf/ic3i/RajputUSTSC22/dblp
>
owl:
sameAs
<
http://dblp.rkbexplorer.com/id/conf/ic3i/RajputUSTSC22
>
rdfs:
seeAlso
<
http://dblp.uni-trier.de/db/conf/ic3i/ic3i2022.html#RajputUSTSC22
>
rdfs:
seeAlso
<
https://doi.org/10.1109/IC3I56241.2022.10073056
>
swrc:
series
<
https://dblp.l3s.de/d2r/resource/conferences/ic3i
>
dc:
title
Understanding IoT Security: A Point-by-point Investigation of IoT Weaknesses and a First Exact Glance at Web Scale IoT Exploits.
(xsd:string)
dc:
type
<
http://purl.org/dc/dcmitype/Text
>
rdf:
type
swrc:InProceedings
rdf:
type
foaf:Document