Show simple item record

dc.contributor.authorKvamme, Sigrid Marita
dc.contributor.authorGudmundsen, Espen
dc.contributor.authorOyetoyan, Tosin Daniel
dc.contributor.authorCruzes, Daniela Soares
dc.date.accessioned2023-02-24T11:44:07Z
dc.date.available2023-02-24T11:44:07Z
dc.date.created2023-01-11T11:06:49Z
dc.date.issued2023
dc.identifier.citationIoT '22: Proceedings of the 12th International Conference on the Internet of Thingsen_US
dc.identifier.isbn978-1-4503-9665-3
dc.identifier.urihttps://hdl.handle.net/11250/3053835
dc.language.isoengen_US
dc.publisherACMen_US
dc.relation.ispartofIoT 2022: Proceedings of the 12th International Conference on the Internet of Things
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleData Protection Fortification: An Agile Approach for Threat Analysis of IoT Dataen_US
dc.title.alternativeData Protection Fortification: An Agile Approach for Threat Analysis of IoT Dataen_US
dc.typeChapteren_US
dc.description.versionacceptedVersionen_US
dc.source.pagenumber151-154en_US
dc.identifier.doi10.1145/3567445.3569164
dc.identifier.cristin2104779
dc.relation.projectNorges forskningsråd: 309612en_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal