Automatic Verification and Execution of Cyber Attack on IoT Devices
dc.contributor.author | Færøy, Fartein Lemjan | |
dc.contributor.author | Yamin, Muhammad Mudassar | |
dc.contributor.author | Shukla, Ankur | |
dc.contributor.author | Katt, Basel | |
dc.date.accessioned | 2023-02-24T12:34:47Z | |
dc.date.available | 2023-02-24T12:34:47Z | |
dc.date.created | 2023-01-11T11:38:55Z | |
dc.date.issued | 2023 | |
dc.identifier.issn | 1424-8220 | |
dc.identifier.uri | https://hdl.handle.net/11250/3053886 | |
dc.language.iso | eng | en_US |
dc.rights | Navngivelse 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/deed.no | * |
dc.title | Automatic Verification and Execution of Cyber Attack on IoT Devices | en_US |
dc.title.alternative | Automatic Verification and Execution of Cyber Attack on IoT Devices | en_US |
dc.type | Journal article | en_US |
dc.type | Peer reviewed | en_US |
dc.description.version | publishedVersion | en_US |
dc.source.journal | Sensors | en_US |
dc.identifier.doi | https://doi.org/10.3390/s23020733 | |
dc.identifier.cristin | 2104831 | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 |