Virual Oral Presentation Slide by Slide |
IEEE/ICACT20220314 Slide.20 [Big Slide] [YouTube] | Oral Presentation | |
In conclusion, I would like to sum up the main points of our paper in our paper. We have mapped attacks for the critical security risk in the OWASP IoT top 10. We have also selected 17 relevant attack types to produce a comprehensive dataset. We have also shared a systematic approach to designing a realistic IoT testbed. Finally, we have created and shared a new AIoT-Sol dataset for anomalous activity detections in IoT networks. |
[Go to Next Slide] |