Threat models for vulnerability analysis of IoT devices for Manipulation of Demand attacks

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: J. A. Font, J. Jarauta, R. Gesteira, R. Palacios and G. López

Journal title: 2023 JNIC Cybersecurity Conference (JNIC)

Journal publisher: IEEE

Published year: 2023

DOI identifier: 10.23919/JNIC58574.2023.10205781