Research Papers
Authentication of IoT Device and IoT Server Using Secure Vaults
User Customizable IoT Systems Using Self-Aware Sensors and Self-Aware Actuators
A Method to Secure IoT devices Against Botnet Attacks
Rule Conflict and Completeness detection for IoT System