Generating and Sharing IoT-Centric Cyber Threat Intelligence
暂无分享,去创建一个
To automate the collection and analysis of relevant data to infer unsolicited IoT devices and their hosting environments, in near real-time, the automated platform is developed. In this chapter, the core functions, their implementation design, and performance are discussed and evaluated.