作者: Shancang Li , Theo Tryfonas , Honglei Li
DOI: 10.1108/INTR-07-2014-0173
关键词: Computer security 、 Security engineering 、 Cloud computing security 、 Information security 、 Security information and event management 、 Security through obscurity 、 Computer science 、 Internet security 、 Security service 、 Computer security model
摘要: … As a consequence, new security design for IoT shall pay attention to these new standards. … of the security IoT architecture. Security must be addressed throughout the IoT lifecycle from …