Modified graph-based algorithm to analyze security threats in IoT

In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, s...

Full description

Bibliographic Details
Main Authors: Ferhat Arat, Sedat Akleylek
Format: Article
Language:English
Published: PeerJ Inc. 2023-12-01
Series:PeerJ Computer Science
Subjects:
Online Access:https://peerj.com/articles/cs-1743.pdf