| Virual Oral Presentation Slide by Slide |
IEEE/ICACT20220314 Slide.12
[Big Slide]
[YouTube] |
Oral Presentation |
|
|
The OWASP IoT top 10 attack types mapping can be seen as follows: We had come up with several possible attack types for each critical security risk. In our dataset, we selected attacks from the I1, I2, I3, and I5. These attacks are: | |
| [Go to Next Slide] |