IOT-based cyber security identification model through machine learning technique
Manual vulnerability evaluation tools produce erroneous data and lead to difficult analytical thinking. Such security concerns are exacerbated by the variety, imperfection, and redundancies of modern security repositories. These problems were common traits of producers and public vulnerability discl...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-06-01
|
Series: | Measurement: Sensors |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2665917423001277 |