Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture
Crossref DOI link: https://doi.org/10.1007/978-3-031-20160-8_2
Published Online: 2023-01-03
Published Print: 2023
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Moreta, Nicolas
Aragon, David
Oña, Silvana
Jaramillo, Angel
Ibarra, Jaime
Jahankhani, Hamid
Text and Data Mining valid from 2023-01-01
Version of Record valid from 2023-01-01
Chapter History
First Online: 3 January 2023