Dynamic reconfiguration of network protocols for constrained Internet-of-Things devices
Springer International Publishing
Chapter title |
A Study on the Detection of Abnormal Behavior and Vulnerability Analysis in BYOD
|
---|---|
Chapter number | 20 |
Book title |
Internet of Things. IoT Infrastructures
|
Published in |
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, October 2015
|
DOI | 10.1007/978-3-319-47075-7_20 |
Book ISBNs |
978-3-31-947074-0, 978-3-31-947075-7
|
Authors |
Taeeun Kim, Kim, Taeeun |
Country | Count | As % |
---|---|---|
Unknown | 10 | 100% |
Readers by professional status | Count | As % |
---|---|---|
Student > Master | 3 | 30% |
Student > Ph. D. Student | 3 | 30% |
Librarian | 1 | 10% |
Researcher | 1 | 10% |
Student > Bachelor | 1 | 10% |
Other | 0 | 0% |
Unknown | 1 | 10% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 3 | 30% |
Business, Management and Accounting | 1 | 10% |
Psychology | 1 | 10% |
Decision Sciences | 1 | 10% |
Medicine and Dentistry | 1 | 10% |
Other | 1 | 10% |
Unknown | 2 | 20% |