no code implementations • 9 Sep 2021 • Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar
This security model automatically assesses the security of the IoT network by capturing potential attack paths.